Center for Threat-Informed Defense

Version 14.1 15.0

Software : Enterprise ATT&CK Changelog

Added Software

Description

Cheerscrypt is a ransomware that was developed by Cinnamon Tempest and has been used in attacks against ESXi and Windows environments since at least 2022. Cheerscrypt was derived from the leaked Babuk source code and has infrastructure overlaps with deployments of Night Sky ransomware, which was also derived from Babuk.[1][2]

References:

  1. Biderman, O. et al. (2022, October 3). REVEALING EMPEROR DRAGONFLY: NIGHT SKY AND CHEERSCRYPT - A SINGLE RANSOMWARE GROUP. Retrieved December 6, 2023.
  2. Dela Cruz, A. et al. (2022, May 25). New Linux-Based Ransomware Cheerscrypt Targeting ESXi Devices Linked to Leaked Babuk Source Code. Retrieved December 19, 2023.

Description

HUI Loader is a custom DLL loader that has been used since at least 2015 by China-based threat groups including Cinnamon Tempest and menuPass to deploy malware on compromised hosts. HUI Loader has been observed in campaigns loading SodaMaster, PlugX, Cobalt Strike, Komplex, and several strains of ransomware.[1]

References:

  1. Counter Threat Unit Research Team . (2022, June 23). BRONZE STARLIGHT RANSOMWARE OPERATIONS USE HUI LOADER. Retrieved December 7, 2023.

Description

Samurai is a passive backdoor that has been used by ToddyCat since at least 2020. Samurai allows arbitrary C# code execution and is used with multiple modules for remote administration and lateral movement.[1]

References:

  1. Dedola, G. (2022, June 21). APT ToddyCat. Retrieved January 3, 2024.

Description

Ninja is a malware developed in C++ that has been used by ToddyCat to penetrate networks and control remote systems since at least 2020. Ninja is possibly part of a post exploitation toolkit exclusively used by ToddyCat and allows multiple operators to work simultaneously on the same machine. Ninja has been used against government and military entities in Europe and Asia and observed in specific infection chains being deployed by Samurai.[1]

References:

  1. Dedola, G. (2022, June 21). APT ToddyCat. Retrieved January 3, 2024.

Description

LoFiSe has been used by ToddyCat since at least 2023 to identify and collect files of interest on targeted systems.[1]

References:

  1. Dedola, G. et al. (2023, October 12). ToddyCat: Keep calm and check logs. Retrieved January 3, 2024.

Description

Pcexter is an uploader that has been used by ToddyCat since at least 2023 to exfiltrate stolen files.[1]

References:

  1. Dedola, G. et al. (2023, October 12). ToddyCat: Keep calm and check logs. Retrieved January 3, 2024.

Description

SLOWPULSE is a malware that was used by APT5 as early as 2020 including against U.S. Defense Industrial Base (DIB) companies. SLOWPULSE has several variants and can modify legitimate Pulse Secure VPN files in order to log credentials and bypass single and two-factor authentication flows.[1]

References:

  1. Perez, D. et al. (2021, April 20). Check Your Pulse: Suspected APT Actors Leverage Authentication Bypass Techniques and Pulse Secure Zero-Day. Retrieved February 5, 2024.

Description

COATHANGER is a remote access tool (RAT) targeting FortiGate networking appliances. First used in 2023 in targeted intrusions against military and government entities in the Netherlands along with other victims, COATHANGER was disclosed in early 2024, with a high confidence assessment linking this malware to a state-sponsored entity in the People's Republic of China. COATHANGER is delivered after gaining access to a FortiGate device, with in-the-wild observations linked to exploitation of CVE-2022-42475. The name COATHANGER is based on a unique string in the malware used to encrypt configuration files on disk: “She took his coat and hung it up”.[1]

References:

  1. Dutch Military Intelligence and Security Service (MIVD) & Dutch General Intelligence and Security Service (AIVD). (2024, February 6). Ministry of Defense of the Netherlands uncovers COATHANGER, a stealthy Chinese FortiGate RAT. Retrieved February 7, 2024.

Description

NGLite is a backdoor Trojan that is only capable of running commands received through its C2 channel. While the capabilities are standard for a backdoor, NGLite uses a novel C2 channel that leverages a decentralized network based on the legitimate NKN to communicate between the backdoor and the actors.[1]

References:

  1. Robert Falcone, Jeff White, and Peter Renals. (2021, November 7). Targeted Attack Campaign Against ManageEngine ADSelfService Plus Delivers Godzilla Webshells, NGLite Trojan and KdcSponge Stealer. Retrieved February 8, 2024.

Description

NKAbuse is a Go-based, multi-platform malware abusing NKN (New Kind of Network) technology for data exchange between peers, functioning as a potent implant, and equipped with both flooder and backdoor capabilities.[1][2]

References:

  1. Bill Toulas. (2023, December 14). New NKAbuse malware abuses NKN blockchain for stealthy comms. Retrieved February 8, 2024.
  2. KASPERSKY GERT. (2023, December 14). Unveiling NKAbuse: a new multiplatform threat abusing the NKN protocol. Retrieved February 8, 2024.

Description

PULSECHECK is a web shell written in Perl that was used by APT5 as early as 2020 including against Pulse Secure VPNs at US Defense Industrial Base (DIB) companies.[1]

References:

  1. Perez, D. et al. (2021, April 20). Check Your Pulse: Suspected APT Actors Leverage Authentication Bypass Techniques and Pulse Secure Zero-Day. Retrieved February 5, 2024.

Description

PACEMAKER is a credential stealer that was used by APT5 as early as 2020 including activity against US Defense Industrial Base (DIB) companies.[1]

References:

  1. Perez, D. et al. (2021, April 20). Check Your Pulse: Suspected APT Actors Leverage Authentication Bypass Techniques and Pulse Secure Zero-Day. Retrieved February 5, 2024.

Description

SLIGHTPULSE is a web shell that was used by APT5 as early as 2020 including against Pulse Secure VPNs at US Defense Industrial Base (DIB) entities.[1]

References:

  1. Perez, D. et al. (2021, April 20). Check Your Pulse: Suspected APT Actors Leverage Authentication Bypass Techniques and Pulse Secure Zero-Day. Retrieved February 5, 2024.

Description

DarkGate first emerged in 2018 and has evolved into an initial access and data gathering tool associated with various criminal cyber operations. Written in Delphi and named "DarkGate" by its author, DarkGate is associated with credential theft, cryptomining, cryptotheft, and pre-ransomware actions.[1] DarkGate use increased significantly starting in 2022 and is under active development by its author, who provides it as a Malware-as-a-Service offering.[2]

References:

  1. Adi Zeligson & Rotem Kerner. (2018, November 13). Enter The DarkGate - New Cryptocurrency Mining and Ransomware Campaign. Retrieved February 9, 2024.
  2. Ernesto Fernández Provecho, Pham Duy Phuc, Ciana Driscoll & Vinoo Thomas. (2023, November 21). The Continued Evolution of the DarkGate Malware-as-a-Service. Retrieved February 9, 2024.

Description

STEADYPULSE is a web shell that infects targeted Pulse Secure VPN servers through modification of a legitimate Perl script that was used as early as 2020 including in activity against US Defense Industrial Base (DIB) entities.[1]

References:

  1. Perez, D. et al. (2021, April 20). Check Your Pulse: Suspected APT Actors Leverage Authentication Bypass Techniques and Pulse Secure Zero-Day. Retrieved February 5, 2024.

Description

RAPIDPULSE is a web shell that exists as a modification to a legitimate Pulse Secure file that has been used by APT5 since at least 2021.[1]

References:

  1. Perez, D. et al. (2021, May 27). Re-Checking Your Pulse: Updates on Chinese APT Actors Compromising Pulse Secure VPN Devices. Retrieved February 5, 2024.

Description

ZIPLINE is a passive backdoor that was used during Cutting Edge on compromised Secure Connect VPNs for reverse shell and proxy functionality.[1]

References:

  1. McLellan, T. et al. (2024, January 12). Cutting Edge: Suspected APT Targets Ivanti Connect Secure VPN in New Zero-Day Exploitation. Retrieved February 27, 2024.

Description

WIREFIRE is a web shell written in Python that exists as trojanized logic to the visits.py component of Ivanti Connect Secure VPN appliances. WIREFIRE was used during Cutting Edge for downloading files and command execution.[1]

References:

  1. McLellan, T. et al. (2024, January 12). Cutting Edge: Suspected APT Targets Ivanti Connect Secure VPN in New Zero-Day Exploitation. Retrieved February 27, 2024.

Description

GLASSTOKEN is a custom web shell used by threat actors during Cutting Edge to execute commands on compromised Ivanti Secure Connect VPNs.[1]

References:

  1. Meltzer, M. et al. (2024, January 10). Active Exploitation of Two Zero-Day Vulnerabilities in Ivanti Connect Secure VPN. Retrieved February 27, 2024.

Description

FRAMESTING is a Python web shell that was used during Cutting Edge to embed into an Ivanti Connect Secure Python package for command execution.[1]

References:

  1. Lin, M. et al. (2024, January 31). Cutting Edge, Part 2: Investigating Ivanti Connect Secure VPN Zero-Day Exploitation. Retrieved February 27, 2024.

Description

LITTLELAMB.WOOLTEA is a backdoor that was used by UNC5325 during Cutting Edge to deploy malware on targeted Ivanti Connect Secure VPNs and to establish persistence across system upgrades and patches.[1]

References:

  1. Lin, M. et al. (2024, February 27). Cutting Edge, Part 3: Investigating Ivanti Connect Secure VPN Exploitation and Persistence Attempts. Retrieved March 1, 2024.

Description

Mispadu is a banking trojan written in Delphi that was first observed in 2019 and uses a Malware-as-a-Service (MaaS) business model.[1][2] This malware is operated, managed, and sold by the Malteiro cybercriminal group.[2] Mispadu has mainly been used to target victims in Brazil and Mexico, and has also had confirmed operations throughout Latin America and Europe.[2][3][4]

References:

  1. ESET Security. (2019, November 19). Mispadu: Advertisement for a discounted Unhappy Meal. Retrieved March 13, 2024.
  2. SCILabs. (2021, December 23). Cyber Threat Profile Malteiro. Retrieved March 13, 2024.
  3. SCILabs. (2023, May 23). Evolution of banking trojan URSA/Mispadu. Retrieved March 13, 2024.
  4. Pedro Tavares (Segurança Informática). (2020, September 15). Threat analysis: The emergent URSA trojan impacts many countries using a sophisticated loader. Retrieved March 13, 2024.

Description

PITSTOP is a backdoor that was deployed on compromised Ivanti Connect Secure VPNs during Cutting Edge to enable command execution and file read/write.[1]

References:

  1. Lin, M. et al. (2024, February 27). Cutting Edge, Part 3: Investigating Ivanti Connect Secure VPN Exploitation and Persistence Attempts. Retrieved March 1, 2024.

Description

SocGholish is a JavaScript-based loader malware that has been used since at least 2017. It has been observed in use against multiple sectors globally for initial access, primarily through drive-by-downloads masquerading as software updates. SocGholish is operated by Mustard Tempest and its access has been sold to groups including Indrik Spider for downloading secondary RAT and ransomware payloads.[1][2][3][4]

References:

  1. Milenkoski, A. (2022, November 7). SocGholish Diversifies and Expands Its Malware Staging Infrastructure to Counter Defenders. Retrieved March 22, 2024.
  2. Andrew Northern. (2022, November 22). SocGholish, a very real threat from a very fake update. Retrieved February 13, 2024.
  3. Red Canary. (2024, March). Red Canary 2024 Threat Detection Report: SocGholish. Retrieved March 22, 2024.
  4. Secureworks. (n.d.). GOLD PRELUDE . Retrieved March 22, 2024.

Description

AcidRain is an ELF binary targeting modems and routers using MIPS architecture.[1] AcidRain is associated with the ViaSat KA-SAT communication outage that took place during the initial phases of the 2022 full-scale invasion of Ukraine. Analysis indicates overlap with another network device-targeting malware, VPNFilter, associated with Sandworm Team.[1] US and European government sources linked AcidRain to Russian government entities, while Ukrainian government sources linked AcidRain specifically to Sandworm Team.[2][3]

References:

  1. Juan Andres Guerrero-Saade and Max van Amerongen, SentinelOne. (2022, March 31). AcidRain | A Modem Wiper Rains Down on Europe. Retrieved March 25, 2024.
  2. Antony J. Blinken, US Department of State. (2022, May 10). Attribution of Russia’s Malicious Cyber Activity Against Ukraine. Retrieved March 25, 2024.
  3. A.J. Vincens, CyberScoop. (2024, March 18). Researchers spot updated version of malware that hit Viasat. Retrieved March 25, 2024.

Description

Akira ransomware, written in C++, is most prominently (but not exclusively) associated with the a ransomware-as-a-service entity Akira.[1]

References:

  1. Max Kersten & Alexandre Mundo. (2023, November 29). Akira Ransomware. Retrieved April 4, 2024.

Modified Software

Description

Mimikatz is a credential dumper capable of obtaining plaintext Windows account logins and passwords, along with many other features that make it useful for testing the security of networks. [1] [2]

References:

  1. Deply, B. (n.d.). Mimikatz. Retrieved September 29, 2015.
  2. Metcalf, S. (2015, November 13). Unofficial Guide to Mimikatz & Command Reference. Retrieved December 23, 2015.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2023-07-27 15:33:07.594000+00:00 2024-02-09 21:31:30.227000+00:00
x_mitre_attack_spec_version 3.1.0 3.2.0
x_mitre_version 1.8 1.9

Description

Skeleton Key is malware used to inject false credentials into domain controllers with the intent of creating a backdoor password. [1] Functionality similar to Skeleton Key is included as a module in Mimikatz.

References:

  1. Dell SecureWorks. (2015, January 12). Skeleton Key Malware Analysis. Retrieved April 8, 2019.
Details
Dictionary Item Added
FIELD OLD VALUE NEW VALUE
x_mitre_deprecated False
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2020-03-18 16:17:41.437000+00:00 2024-02-06 19:02:00.781000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 1.1 1.2

Description

Taidoor is a remote access trojan (RAT) that has been used by Chinese government cyber actors to maintain access on victim networks.[1] Taidoor has primarily been used against Taiwanese government organizations since at least 2010.[2]

References:

  1. CISA, FBI, DOD. (2021, August). MAR-10292089-1.v2 – Chinese Remote Access Trojan: TAIDOOR. Retrieved August 24, 2021.
  2. Trend Micro. (2012). The Taidoor Campaign. Retrieved November 12, 2014.
Details
Dictionary Item Added
FIELD OLD VALUE NEW VALUE
x_mitre_deprecated False
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2021-10-15 12:34:22.853000+00:00 2024-04-10 22:36:03.362000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 2.0 2.1

Description

PoisonIvy is a popular remote access tool (RAT) that has been used by many groups.[1][2][3]

References:

  1. FireEye. (2014). POISON IVY: Assessing Damage and Extracting Intelligence. Retrieved November 12, 2014.
  2. O'Gorman, G., and McDonald, G.. (2012, September 6). The Elderwood Project. Retrieved February 15, 2018.
  3. Hayashi, K. (2005, August 18). Backdoor.Darkmoon. Retrieved February 23, 2018.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2023-03-20 22:03:44.669000+00:00 2024-02-14 19:16:01.583000+00:00
x_mitre_attack_spec_version 3.1.0 3.2.0
x_mitre_version 2.1 2.2

Description

BISCUIT is a backdoor that has been used by APT1 since as early as 2007. [1]

References:

  1. Mandiant. (n.d.). APT1 Exposing One of China’s Cyber Espionage Units. Retrieved July 18, 2016.
Details
Dictionary Item Added
FIELD OLD VALUE NEW VALUE
x_mitre_deprecated False
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2020-03-30 14:57:52.169000+00:00 2023-12-26 19:55:54.853000+00:00
external_references[3]['url'] https://www.fireeye.com/content/dam/fireeye-www/services/pdfs/mandiant-apt1-report-appendix.zip https://www.mandiant.com/sites/default/files/2021-09/mandiant-apt1-report.pdf
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 1.2 1.3

Description

Uroburos is a sophisticated cyber espionage tool written in C that has been used by units within Russia's Federal Security Service (FSB) associated with the Turla toolset to collect intelligence on sensitive targets worldwide. Uroburos has several variants and has undergone nearly constant upgrade since its initial development in 2003 to keep it viable after public disclosures. Uroburos is typically deployed to external-facing nodes on a targeted network and has the ability to leverage additional tools and TTPs to further exploit an internal network. Uroburos has interoperable implants for Windows, Linux, and macOS, employs a high level of stealth in communications and architecture, and can easily incorporate new or replacement components.[1][2]

References:

  1. FBI et al. (2023, May 9). Hunting Russian Intelligence “Snake” Malware. Retrieved June 8, 2023.
  2. Kaspersky Lab's Global Research and Analysis Team. (2014, August 7). The Epic Turla Operation: Solving some of the mysteries of Snake/Uroburos. Retrieved December 11, 2014.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2023-10-02 17:26:25.052000+00:00 2024-04-10 22:18:48.304000+00:00
x_mitre_version 2.0 2.1

Description

PsExec is a free Microsoft tool that can be used to execute a program on another computer. It is used by IT administrators and attackers.[1][2]

References:

  1. Russinovich, M. (2014, May 2). Windows Sysinternals PsExec v2.11. Retrieved May 13, 2015.
  2. Pilkington, M. (2012, December 17). Protecting Privileged Domain Accounts: PsExec Deep-Dive. Retrieved August 17, 2016.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2023-08-09 18:07:11.859000+00:00 2024-04-04 03:50:11+00:00
x_mitre_attack_spec_version 3.1.0 3.2.0
x_mitre_version 1.5 1.6

Description

gh0st RAT is a remote access tool (RAT). The source code is public and it has been used by multiple groups.[1][2][3]

References:

  1. FireEye Threat Intelligence. (2015, July 13). Demonstrating Hustle, Chinese APT Groups Quickly Use Zero-Day Vulnerability (CVE-2015-5119) Following Hacking Team Leak. Retrieved January 25, 2016.
  2. Sabo, S. (2018, February 15). Musical Chairs Playing Tetris. Retrieved February 19, 2018.
  3. Pantazopoulos, N. (2018, April 17). Decoding network data from a Gh0st RAT variant. Retrieved November 2, 2018.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2023-03-20 22:03:44.666000+00:00 2024-02-06 19:00:45.557000+00:00
x_mitre_attack_spec_version 3.1.0 3.2.0
x_mitre_version 3.1 3.2

Description

The Net utility is a component of the Windows operating system. It is used in command-line operations for control of users, groups, services, and network connections. [1]

Net has a great deal of functionality, [2] much of which is useful for an adversary, such as gathering system and network information for Discovery, moving laterally through SMB/Windows Admin Shares using net use commands, and interacting with services. The net1.exe utility is executed for certain functionality when net.exe is run and can be used directly in commands such as net1 user.

References:

  1. Microsoft. (2006, October 18). Net.exe Utility. Retrieved September 22, 2015.
  2. Savill, J. (1999, March 4). Net.exe reference. Retrieved September 22, 2015.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2023-07-25 19:25:59.767000+00:00 2024-02-01 04:34:30.855000+00:00
external_references[2]['url'] http://windowsitpro.com/windows/netexe-reference https://web.archive.org/web/20150511162820/http://windowsitpro.com/windows/netexe-reference
x_mitre_attack_spec_version 3.1.0 3.2.0
x_mitre_version 2.5 2.6

Description

JHUHUGIT is malware used by APT28. It is based on Carberp source code and serves as reconnaissance malware. [1] [2] [3] [4]

References:

  1. Kaspersky Lab's Global Research and Analysis Team. (2015, December 4). Sofacy APT hits high profile targets with updated toolset. Retrieved December 10, 2015.
  2. F-Secure. (2015, September 8). Sofacy Recycles Carberp and Metasploit Code. Retrieved August 3, 2016.
  3. ESET. (2016, October). En Route with Sednit - Part 1: Approaching the Target. Retrieved November 8, 2016.
  4. FireEye iSIGHT Intelligence. (2017, January 11). APT28: At the Center of the Storm. Retrieved January 11, 2017.
Details
Dictionary Item Added
FIELD OLD VALUE NEW VALUE
x_mitre_deprecated False
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2020-03-30 16:51:56.323000+00:00 2024-04-11 01:49:50.568000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 2.1 2.2

Description

CozyCar is malware that was used by APT29 from 2010 to 2015. It is a modular malware platform, and its backdoor component can be instructed to download and execute a variety of modules with different functionality. [1]

References:

  1. F-Secure Labs. (2015, September 17). The Dukes: 7 years of Russian cyberespionage. Retrieved December 10, 2015.
Details
Dictionary Item Added
FIELD OLD VALUE NEW VALUE
x_mitre_deprecated False
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2020-03-28 21:32:59.528000+00:00 2024-04-11 02:44:33.881000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 1.2 1.3

Description

The Tasklist utility displays a list of applications and services with their Process IDs (PID) for all tasks running on either a local or a remote computer. It is packaged with Windows operating systems and can be executed from the command-line interface. [1]

References:

  1. Microsoft. (n.d.). Tasklist. Retrieved December 23, 2015.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2022-10-12 21:30:23.536000+00:00 2024-02-12 19:14:37.984000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 1.1 1.2

Description

Sakula is a remote access tool (RAT) that first surfaced in 2012 and was used in intrusions throughout 2015. [1]

References:

  1. Dell SecureWorks Counter Threat Unit Threat Intelligence. (2015, July 30). Sakula Malware Family. Retrieved January 26, 2016.
Details
Dictionary Item Added
FIELD OLD VALUE NEW VALUE
x_mitre_deprecated False
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2020-03-30 18:13:29.169000+00:00 2024-04-11 00:10:10.398000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 1.1 1.2

Description

Elise is a custom backdoor Trojan that appears to be used exclusively by Lotus Blossom. It is part of a larger group of tools referred to as LStudio, ST Group, and APT0LSTU. [1][2]

References:

  1. Falcone, R., et al.. (2015, June 16). Operation Lotus Blossom. Retrieved February 15, 2016.
  2. Accenture Security. (2018, January 27). DRAGONFISH DELIVERS NEW FORM OF ELISE MALWARE TARGETING ASEAN DEFENCE MINISTERS’ MEETING AND ASSOCIATES. Retrieved November 14, 2018.
Details
Dictionary Item Added
FIELD OLD VALUE NEW VALUE
x_mitre_deprecated False
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2020-03-20 23:20:16.933000+00:00 2024-04-11 02:35:48.740000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 1.2 1.3

Description

Emissary is a Trojan that has been used by Lotus Blossom. It shares code with Elise, with both Trojans being part of a malware group referred to as LStudio. [1]

References:

  1. Falcone, R. and Miller-Osborn, J.. (2015, December 18). Attack on French Diplomat Linked to Operation Lotus Blossom. Retrieved February 15, 2016.
Details
Dictionary Item Added
FIELD OLD VALUE NEW VALUE
x_mitre_deprecated False
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2021-08-09 14:21:48.477000+00:00 2024-04-11 02:35:14.040000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 1.2 1.3

Description

Hi-Zor is a remote access tool (RAT) that has characteristics similar to Sakula. It was used in a campaign named INOCNATION. [1]

References:

  1. Fidelis Threat Research Team. (2016, January 27). Introducing Hi-Zor RAT. Retrieved March 24, 2016.
Details
Dictionary Item Added
FIELD OLD VALUE NEW VALUE
x_mitre_deprecated False
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2021-02-09 14:57:16.085000+00:00 2024-04-11 02:20:26.551000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 1.1 1.2

Description

netstat is an operating system utility that displays active TCP connections, listening ports, and network statistics. [1]

References:

  1. Microsoft. (n.d.). Netstat. Retrieved April 17, 2016.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2023-07-25 19:25:05.678000+00:00 2024-01-23 19:57:39.135000+00:00
x_mitre_attack_spec_version 3.1.0 3.2.0
x_mitre_version 1.2 1.3

Description

WEBC2 is a family of backdoor malware used by APT1 as early as July 2006. WEBC2 backdoors are designed to retrieve a webpage, with commands hidden in HTML comments or special tags, from a predetermined C2 server. [1][2]

References:

  1. Mandiant. (n.d.). Appendix C (Digital) - The Malware Arsenal. Retrieved July 18, 2016.
  2. Mandiant. (n.d.). APT1 Exposing One of China’s Cyber Espionage Units. Retrieved July 18, 2016.
Details
Dictionary Item Added
FIELD OLD VALUE NEW VALUE
x_mitre_deprecated False
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2020-08-25 21:23:24.223000+00:00 2023-12-26 19:55:54.848000+00:00
external_references[2]['url'] https://www.fireeye.com/content/dam/fireeye-www/services/pdfs/mandiant-apt1-report-appendix.zip https://www.mandiant.com/sites/default/files/2021-09/mandiant-apt1-report.pdf
x_mitre_attack_spec_version 2.1.0 3.2.0

Description

Prikormka is a malware family used in a campaign known as Operation Groundbait. It has predominantly been observed in Ukraine and was used as early as 2008. [1]

References:

  1. Cherepanov, A.. (2016, May 17). Operation Groundbait: Analysis of a surveillance toolkit. Retrieved May 18, 2016.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2022-04-19 01:42:59.312000+00:00 2024-04-11 00:25:44.638000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 1.3 1.4

Description

Remsec is a modular backdoor that has been used by Strider and appears to have been designed primarily for espionage purposes. Many of its modules are written in Lua. [1]

References:

  1. Symantec Security Response. (2016, August 7). Strider: Cyberespionage group turns eye of Sauron on targets. Retrieved August 17, 2016.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2023-03-28 20:28:28.088000+00:00 2024-04-11 00:16:18.864000+00:00
x_mitre_attack_spec_version 3.1.0 3.2.0
x_mitre_version 1.2 1.3

Description

TINYTYPHON is a backdoor that has been used by the actors responsible for the MONSOON campaign. The majority of its code was reportedly taken from the MyDoom worm. [1]

References:

  1. Settle, A., et al. (2016, August 8). MONSOON - Analysis Of An APT Campaign. Retrieved September 22, 2016.
Details
Dictionary Item Added
FIELD OLD VALUE NEW VALUE
x_mitre_aliases ['TINYTYPHON']
x_mitre_deprecated False
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2018-10-17 00:14:20.652000+00:00 2024-04-10 22:32:05.321000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 1.0 1.1

Description

USBStealer is malware that has been used by APT28 since at least 2005 to extract information from air-gapped networks. It does not have the capability to communicate over the Internet and has been used in conjunction with ADVSTORESHELL. [1] [2]

References:

  1. Calvet, J. (2014, November 11). Sednit Espionage Group Attacking Air-Gapped Networks. Retrieved January 4, 2017.
  2. Kaspersky Lab's Global Research and Analysis Team. (2015, December 4). Sofacy APT hits high profile targets with updated toolset. Retrieved December 10, 2015.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2022-04-19 22:53:27.639000+00:00 2024-04-10 22:17:40.838000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 1.2 1.3

Modified Description View changes side-by-side
[Shamoon](https://attack.mitre.org/software/S0140) is wiper malware that was first used by an Iranian group known as the "Cutting Sword of Justice" in 2012. Other versions known as Shamoon 2 and Shamoon 3 were observed in 2016 and 2018. [Shamoon](https://attack.mitre.org/software/S0140) has also been seen leveraging [RawDisk](https://attack.mitre.org/software/S0364) and Filerase to carry out data wiping tasks. Analysis has linked [Shamoon](https://attack.mitre.org/software/S0140) with [Kwampirs](https://attack.mitre.org/software/S0236) based on multiple shared artifacts and coding patterns.(Citation: Cylera Kwampirs 2022) The term Shamoon is sometimes used to refer to the group using the malware as well as the malware itself.(Citation: Palo Alto Shamoon Nov 2016)(Citation: Unit 42 Shamoon3 2018)(Citation: Symantec Shamoon 2012)(Citation: FireEye Shamoon Nov 2016)
Details
Dictionary Item Added
FIELD OLD VALUE NEW VALUE
x_mitre_deprecated False
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2021-02-09 13:42:15.121000+00:00 2024-02-08 20:53:17.332000+00:00
description [Shamoon](https://attack.mitre.org/software/S0140) is wiper malware that was first used by an Iranian group known as the "Cutting Sword of Justice" in 2012. Other versions known as Shamoon 2 and Shamoon 3 were observed in 2016 and 2018. [Shamoon](https://attack.mitre.org/software/S0140) has also been seen leveraging [RawDisk](https://attack.mitre.org/software/S0364) and Filerase to carry out data wiping tasks. The term Shamoon is sometimes used to refer to the group using the malware as well as the malware itself.(Citation: Palo Alto Shamoon Nov 2016)(Citation: Unit 42 Shamoon3 2018)(Citation: Symantec Shamoon 2012)(Citation: FireEye Shamoon Nov 2016) [Shamoon](https://attack.mitre.org/software/S0140) is wiper malware that was first used by an Iranian group known as the "Cutting Sword of Justice" in 2012. Other versions known as Shamoon 2 and Shamoon 3 were observed in 2016 and 2018. [Shamoon](https://attack.mitre.org/software/S0140) has also been seen leveraging [RawDisk](https://attack.mitre.org/software/S0364) and Filerase to carry out data wiping tasks. Analysis has linked [Shamoon](https://attack.mitre.org/software/S0140) with [Kwampirs](https://attack.mitre.org/software/S0236) based on multiple shared artifacts and coding patterns.(Citation: Cylera Kwampirs 2022) The term Shamoon is sometimes used to refer to the group using the malware as well as the malware itself.(Citation: Palo Alto Shamoon Nov 2016)(Citation: Unit 42 Shamoon3 2018)(Citation: Symantec Shamoon 2012)(Citation: FireEye Shamoon Nov 2016)
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 2.1 2.2
Iterable Item Added
FIELD OLD VALUE NEW VALUE
external_references {'source_name': 'Cylera Kwampirs 2022', 'description': 'Pablo Rincón Crespo. (2022, January). The link between Kwampirs (Orangeworm) and Shamoon APTs. Retrieved February 8, 2024.', 'url': 'https://resources.cylera.com/hubfs/Cylera%20Labs/Cylera%20Labs%20Kwampirs%20Shamoon%20Technical%20Report.pdf'}

Description

Winnti for Windows is a modular remote access Trojan (RAT) that has been used likely by multiple groups to carry out intrusions in various regions since at least 2010, including by one group referred to as the same name, Winnti Group.[1][2][3][4]. The Linux variant is tracked separately under Winnti for Linux.[5]

References:

  1. Kaspersky Lab's Global Research and Analysis Team. (2013, April 11). Winnti. More than just a game. Retrieved February 8, 2017.
  2. Cap, P., et al. (2017, January 25). Detecting threat actors in recent German industrial attacks with Windows Defender ATP. Retrieved February 8, 2017.
  3. Novetta Threat Research Group. (2015, April 7). Winnti Analysis. Retrieved February 8, 2017.
  4. Hegel, T. (2018, May 3). Burning Umbrella: An Intelligence Report on the Winnti Umbrella and Associated State-Sponsored Attackers. Retrieved July 8, 2018.
  5. Chronicle Blog. (2019, May 15). Winnti: More than just Windows and Gates. Retrieved April 29, 2020.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2023-03-20 22:02:53.982000+00:00 2024-04-10 20:35:29.262000+00:00
x_mitre_attack_spec_version 3.1.0 3.2.0
x_mitre_version 3.0 3.1

Description

RedLeaves is a malware family used by menuPass. The code overlaps with PlugX and may be based upon the open source tool Trochilus. [1] [2]

References:

  1. PwC and BAE Systems. (2017, April). Operation Cloud Hopper: Technical Annex. Retrieved April 13, 2017.
  2. FireEye iSIGHT Intelligence. (2017, April 6). APT10 (MenuPass Group): New Tools, Global Campaign Latest Manifestation of Longstanding Threat. Retrieved June 29, 2017.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2023-03-23 15:14:18.594000+00:00 2024-04-11 00:17:52.256000+00:00
x_mitre_attack_spec_version 3.1.0 3.2.0
x_mitre_version 1.1 1.2

Description

Cobalt Strike is a commercial, full-featured, remote access tool that bills itself as “adversary simulation software designed to execute targeted attacks and emulate the post-exploitation actions of advanced threat actors”. Cobalt Strike’s interactive post-exploit capabilities cover the full range of ATT&CK tactics, all executed within a single, integrated system.[1]

In addition to its own capabilities, Cobalt Strike leverages the capabilities of other well-known tools such as Metasploit and Mimikatz.[1]

References:

  1. Strategic Cyber LLC. (2017, March 14). Cobalt Strike Manual. Retrieved May 24, 2017.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2023-08-09 16:47:36.538000+00:00 2024-04-17 22:05:58.343000+00:00
x_mitre_attack_spec_version 3.1.0 3.2.0
x_mitre_version 1.11 1.12

Description

Gazer is a backdoor used by Turla since at least 2016. [1]

References:

  1. ESET. (2017, August). Gazing at Gazer: Turla’s new second stage backdoor. Retrieved September 14, 2017.
Details
Dictionary Item Added
FIELD OLD VALUE NEW VALUE
x_mitre_deprecated False
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2020-12-04 21:07:22.870000+00:00 2024-04-11 02:28:51.206000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 1.2 1.3

Description

Helminth is a backdoor that has at least two variants - one written in VBScript and PowerShell that is delivered via a macros in Excel spreadsheets, and one that is a standalone Windows executable. [1]

References:

  1. Falcone, R. and Lee, B.. (2016, May 26). The OilRig Campaign: Attacks on Saudi Arabian Organizations Deliver Helminth Backdoor. Retrieved May 3, 2017.
Details
Dictionary Item Added
FIELD OLD VALUE NEW VALUE
x_mitre_deprecated False
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2020-03-28 21:35:13.610000+00:00 2024-04-11 02:22:38.177000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 1.1 1.2

Description

Reaver is a malware family that has been in the wild since at least late 2016. Reporting indicates victims have primarily been associated with the "Five Poisons," which are movements the Chinese government considers dangerous. The type of malware is rare due to its final payload being in the form of Control Panel items.[1]

References:

  1. Grunzweig, J. and Miller-Osborn, J. (2017, November 10). New Malware with Ties to SunOrcal Discovered. Retrieved November 16, 2017.
Details
Dictionary Item Added
FIELD OLD VALUE NEW VALUE
x_mitre_deprecated False
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2021-02-09 15:02:42.727000+00:00 2024-04-11 00:21:09.543000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 1.1 1.2

Description

Volgmer is a backdoor Trojan designed to provide covert access to a compromised system. It has been used since at least 2013 to target the government, financial, automotive, and media industries. Its primary delivery mechanism is suspected to be spearphishing. [1]

References:

  1. US-CERT. (2017, November 22). Alert (TA17-318B): HIDDEN COBRA – North Korean Trojan: Volgmer. Retrieved December 7, 2017.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2023-03-26 20:40:35.183000+00:00 2024-04-10 22:16:05.440000+00:00
x_mitre_attack_spec_version 3.1.0 3.2.0
x_mitre_version 1.2 1.3

Description

DOGCALL is a backdoor used by APT37 that has been used to target South Korean government and military organizations in 2017. It is typically dropped using a Hangul Word Processor (HWP) exploit. [1]

References:

  1. FireEye. (2018, February 20). APT37 (Reaper): The Overlooked North Korean Actor. Retrieved March 1, 2018.
Details
Dictionary Item Added
FIELD OLD VALUE NEW VALUE
x_mitre_deprecated False
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2020-03-30 15:27:25.149000+00:00 2024-04-11 02:37:34.915000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 1.2 1.3

Description

Smoke Loader is a malicious bot application that can be used to load other malware. Smoke Loader has been seen in the wild since at least 2011 and has included a number of different payloads. It is notorious for its use of deception and self-protection. It also comes with several plug-ins. [1] [2]

References:

  1. Hasherezade. (2016, September 12). Smoke Loader – downloader with a smokescreen still alive. Retrieved March 20, 2018.
  2. Windows Defender Research. (2018, March 7). Behavior monitoring combined with machine learning spoils a massive Dofoil coin mining campaign. Retrieved March 20, 2018.
Details
Dictionary Item Added
FIELD OLD VALUE NEW VALUE
x_mitre_deprecated False
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2020-03-28 21:43:37.366000+00:00 2024-04-11 00:04:55.094000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 1.2 1.3

Description

NanHaiShu is a remote access tool and JScript backdoor used by Leviathan. NanHaiShu has been used to target government and private-sector organizations that have relations to the South China Sea dispute. [1] [2]

References:

  1. Axel F, Pierre T. (2017, October 16). Leviathan: Espionage actor spearphishes maritime and defense targets. Retrieved February 15, 2018.
  2. F-Secure Labs. (2016, July). NANHAISHU RATing the South China Sea. Retrieved July 6, 2018.
Details
Dictionary Item Added
FIELD OLD VALUE NEW VALUE
x_mitre_deprecated False
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2020-06-23 20:05:03.169000+00:00 2024-04-11 00:37:11.186000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 1.1 1.2

Description

ZeroT is a Trojan used by TA459, often in conjunction with PlugX. [1] [2]

References:

  1. Axel F. (2017, April 27). APT Targets Financial Analysts with CVE-2017-0199. Retrieved February 15, 2018.
  2. Huss, D., et al. (2017, February 2). Oops, they did it again: APT Targets Russia and Belarus with ZeroT and PlugX. Retrieved April 5, 2018.
Details
Dictionary Item Added
FIELD OLD VALUE NEW VALUE
x_mitre_deprecated False
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2020-03-30 18:31:33.197000+00:00 2024-04-10 20:32:14.510000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 1.1 1.2

Description

HOMEFRY is a 64-bit Windows password dumper/cracker that has previously been used in conjunction with other Leviathan backdoors. [1]

References:

  1. FireEye. (2018, March 16). Suspected Chinese Cyber Espionage Group (TEMP.Periscope) Targeting U.S. Engineering and Maritime Industries. Retrieved April 11, 2018.
Details
Dictionary Item Added
FIELD OLD VALUE NEW VALUE
x_mitre_deprecated False
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2020-03-30 16:47:38.393000+00:00 2024-04-11 02:18:12.743000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 1.1 1.2

Modified Description View changes side-by-side
[Kwampirs](https://attack.mitre.org/software/S0236) is a backdoor Trojan used by [Orangeworm](https://attack.mitre.org/groups/G0071). It [Kwampirs](https://attack.mitre.org/software/S0236) has been found on machines which had software installed for the use and control of high-tech imaging devices such as X-Ray and MRI machines. (Citation: machines.(Citation: Symantec Orangeworm April 2018) [Kwampirs](https://attack.mitre.org/software/S0236) has multiple technical overlaps with [Shamoon](https://attack.mitre.org/software/S0140) based on reverse engineering analysis.(Citation: Cylera Kwampirs 2022)
Details
Dictionary Item Added
FIELD OLD VALUE NEW VALUE
x_mitre_deprecated False
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2020-03-18 22:06:42.386000+00:00 2024-04-11 01:44:05.770000+00:00
description [Kwampirs](https://attack.mitre.org/software/S0236) is a backdoor Trojan used by [Orangeworm](https://attack.mitre.org/groups/G0071). It has been found on machines which had software installed for the use and control of high-tech imaging devices such as X-Ray and MRI machines. (Citation: Symantec Orangeworm April 2018) [Kwampirs](https://attack.mitre.org/software/S0236) is a backdoor Trojan used by [Orangeworm](https://attack.mitre.org/groups/G0071). [Kwampirs](https://attack.mitre.org/software/S0236) has been found on machines which had software installed for the use and control of high-tech imaging devices such as X-Ray and MRI machines.(Citation: Symantec Orangeworm April 2018) [Kwampirs](https://attack.mitre.org/software/S0236) has multiple technical overlaps with [Shamoon](https://attack.mitre.org/software/S0140) based on reverse engineering analysis.(Citation: Cylera Kwampirs 2022)
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 1.1 1.2
Iterable Item Added
FIELD OLD VALUE NEW VALUE
external_references {'source_name': 'Cylera Kwampirs 2022', 'description': 'Pablo Rincón Crespo. (2022, January). The link between Kwampirs (Orangeworm) and Shamoon APTs. Retrieved February 8, 2024.', 'url': 'https://resources.cylera.com/hubfs/Cylera%20Labs/Cylera%20Labs%20Kwampirs%20Shamoon%20Technical%20Report.pdf'}

Description

GravityRAT is a remote access tool (RAT) and has been in ongoing development since 2016. The actor behind the tool remains unknown, but two usernames have been recovered that link to the author, which are "TheMartian" and "The Invincible." According to the National Computer Emergency Response Team (CERT) of India, the malware has been identified in attacks against organization and entities in India. [1]

References:

  1. Mercer, W., Rascagneres, P. (2018, April 26). GravityRAT - The Two-Year Evolution Of An APT Targeting India. Retrieved May 16, 2018.
Details
Dictionary Item Added
FIELD OLD VALUE NEW VALUE
x_mitre_deprecated False
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2020-03-30 20:44:34.524000+00:00 2024-04-11 02:25:20.119000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 1.2 1.3

Description

Mosquito is a Win32 backdoor that has been used by Turla. Mosquito is made up of three parts: the installer, the launcher, and the backdoor. The main backdoor is called CommanderDLL and is launched by the loader program. [1]

References:

  1. ESET, et al. (2018, January). Diplomats in Eastern Europe bitten by a Turla mosquito. Retrieved July 3, 2018.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2023-03-26 19:19:33.603000+00:00 2024-04-11 00:38:26.326000+00:00
x_mitre_attack_spec_version 3.1.0 3.2.0
x_mitre_version 1.2 1.3

Description

VERMIN is a remote access tool written in the Microsoft .NET framework. It is mostly composed of original code, but also has some open source code. [1]

References:

  1. Lancaster, T., Cortes, J. (2018, January 29). VERMIN: Quasar RAT and Custom Malware Used In Ukraine. Retrieved July 5, 2018.
Details
Dictionary Item Added
FIELD OLD VALUE NEW VALUE
x_mitre_deprecated False
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2020-03-30 18:26:04.840000+00:00 2024-04-10 22:17:02.480000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 1.1 1.2

Description

TYPEFRAME is a remote access tool that has been used by Lazarus Group. [1]

References:

  1. US-CERT. (2018, June 14). MAR-10135536-12 – North Korean Trojan: TYPEFRAME. Retrieved July 13, 2018.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2023-03-26 20:22:31.288000+00:00 2024-04-10 22:26:03.638000+00:00
x_mitre_attack_spec_version 3.1.0 3.2.0
x_mitre_version 1.2 1.3

Description

TrickBot is a Trojan spyware program written in C++ that first emerged in September 2016 as a possible successor to Dyre. TrickBot was developed and initially used by Wizard Spider for targeting banking sites in North America, Australia, and throughout Europe; it has since been used against all sectors worldwide as part of "big game hunting" ransomware campaigns.[1][2][3][4]

References:

  1. Salinas, M., Holguin, J. (2017, June). Evolution of Trickbot. Retrieved July 31, 2018.
  2. Reaves, J. (2016, October 15). TrickBot: We Missed you, Dyre. Retrieved August 2, 2018.
  3. Keshet, L. (2016, November 09). Tricks of the Trade: A Deeper Look Into TrickBot’s Machinations. Retrieved August 2, 2018.
  4. Podlosky, A., Hanel, A. et al. (2020, October 16). WIZARD SPIDER Update: Resilient, Reactive and Resolute. Retrieved June 15, 2021.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2023-08-09 16:44:56.511000+00:00 2024-04-10 22:28:21.746000+00:00
x_mitre_attack_spec_version 3.1.0 3.2.0
x_mitre_version 2.1 2.2

Description

FELIXROOT is a backdoor that has been used to target Ukrainian victims. [1]

References:

  1. Patil, S. (2018, June 26). Microsoft Office Vulnerabilities Used to Distribute FELIXROOT Backdoor in Recent Campaign. Retrieved July 31, 2018.
Details
Dictionary Item Added
FIELD OLD VALUE NEW VALUE
x_mitre_deprecated False
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2020-03-30 16:23:47.799000+00:00 2024-04-11 02:33:38.488000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 2.1 2.2

Description

Bisonal is a remote access tool (RAT) that has been used by Tonto Team against public and private sector organizations in Russia, South Korea, and Japan since at least December 2010.[1][2]

References:

  1. Hayashi, K., Ray, V. (2018, July 31). Bisonal Malware Used in Attacks Against Russia and South Korea. Retrieved August 7, 2018.
  2. Mercer, W., et al. (2020, March 5). Bisonal: 10 years of play. Retrieved January 26, 2022.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2022-04-18 17:18:36.512000+00:00 2024-04-11 02:53:35.918000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 2.0 2.1

Description

This piece of malware steals the content of the user's keychain while maintaining a permanent backdoor [1].

References:

  1. Marc-Etienne M.Leveille. (2016, July 6). New OSX/Keydnap malware is hungry for credentials. Retrieved July 3, 2017.
Details
Dictionary Item Added
FIELD OLD VALUE NEW VALUE
x_mitre_deprecated False
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2021-10-17 14:35:31.022000+00:00 2024-01-10 15:18:40.400000+00:00
external_references[4]['url'] https://www.synack.com/2017/01/01/mac-malware-2016/ https://objective-see.org/blog/blog_0x16.html
x_mitre_attack_spec_version 2.1.0 3.2.0

Description

Moreeggs is a JScript backdoor used by Cobalt Group and FIN6. Its name was given based on the variable "Moreeggs" being present in its code. There are at least two different versions of the backdoor being used, version 2.0 and version 4.4. [1][2]

References:

  1. Svajcer, V. (2018, July 31). Multiple Cobalt Personality Disorder. Retrieved September 5, 2018.
  2. Villadsen, O.. (2019, August 29). More_eggs, Anyone? Threat Actor ITG08 Strikes Again. Retrieved September 16, 2019.
Details
Dictionary Item Added
FIELD OLD VALUE NEW VALUE
x_mitre_deprecated False
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2021-04-23 19:15:17.339000+00:00 2024-04-11 00:40:07.038000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 3.0 3.1

Description

Zeus Panda is a Trojan designed to steal banking information and other sensitive credentials for exfiltration. Zeus Panda’s original source code was leaked in 2011, allowing threat actors to use its source code as a basis for new malware variants. It is mainly used to target Windows operating systems ranging from Windows XP through Windows 10.[1][2]

References:

  1. Brumaghin, E., et al. (2017, November 02). Poisoning the Well: Banking Trojan Targets Google Search Results. Retrieved November 5, 2018.
  2. Ebach, L. (2017, June 22). Analysis Results of Zeus.Variant.Panda. Retrieved November 5, 2018.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2023-03-22 05:47:42.436000+00:00 2024-04-10 20:31:00.234000+00:00
x_mitre_attack_spec_version 3.1.0 3.2.0
x_mitre_version 1.3 1.4

Description

UBoatRAT is a remote access tool that was identified in May 2017.[1]

References:

  1. Hayashi, K. (2017, November 28). UBoatRAT Navigates East Asia. Retrieved January 12, 2018.
Details
Dictionary Item Added
FIELD OLD VALUE NEW VALUE
x_mitre_deprecated False
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2020-03-30 18:24:01.572000+00:00 2024-04-10 22:22:03.759000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 1.1 1.2

Description

Micropsia is a remote access tool written in Delphi.[1][2]

References:

  1. Rascagneres, P., Mercer, W. (2017, June 19). Delphi Used To Score Against Palestine. Retrieved November 13, 2018.
  2. Tsarfaty, Y. (2018, July 25). Micropsia Malware. Retrieved November 13, 2018.
Details
Dictionary Item Added
FIELD OLD VALUE NEW VALUE
x_mitre_deprecated False
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2020-03-30 17:03:01.353000+00:00 2024-04-11 00:43:46.245000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 1.1 1.2

Description

GreyEnergy is a backdoor written in C and compiled in Visual Studio. GreyEnergy shares similarities with the BlackEnergy malware and is thought to be the successor of it.[1]

References:

  1. Cherepanov, A. (2018, October). GREYENERGY A successor to BlackEnergy. Retrieved November 15, 2018.
Details
Dictionary Item Added
FIELD OLD VALUE NEW VALUE
x_mitre_deprecated False
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2020-03-30 16:44:35.685000+00:00 2024-04-11 02:24:46.255000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 1.1 1.2

Description

Seasalt is malware that has been linked to APT1's 2010 operations. It shares some code similarities with OceanSalt.[1][2]

References:

  1. Mandiant. (n.d.). Appendix C (Digital) - The Malware Arsenal. Retrieved July 18, 2016.
  2. Sherstobitoff, R., Malhotra, A. (2018, October 18). ‘Operation Oceansalt’ Attacks South Korea, U.S., and Canada With Source Code From Chinese Hacker Group. Retrieved November 30, 2018.
Details
Dictionary Item Added
FIELD OLD VALUE NEW VALUE
x_mitre_deprecated False
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2020-03-19 19:18:10.963000+00:00 2024-04-11 00:08:51.818000+00:00
external_references[2]['url'] https://www.fireeye.com/content/dam/fireeye-www/services/pdfs/mandiant-apt1-report-appendix.zip https://www.mandiant.com/sites/default/files/2021-09/mandiant-apt1-report.pdf
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 1.1 1.2

Description

AuditCred is a malicious DLL that has been used by Lazarus Group during their 2018 attacks.[1]

References:

  1. Trend Micro. (2018, November 20). Lazarus Continues Heists, Mounts Attacks on Financial Organizations in Latin America. Retrieved December 3, 2018.
Details
Dictionary Item Added
FIELD OLD VALUE NEW VALUE
x_mitre_deprecated False
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2020-03-30 14:51:50.371000+00:00 2024-04-11 02:57:01.302000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 1.1 1.2

Description

Cardinal RAT is a potentially low volume remote access trojan (RAT) observed since December 2015. Cardinal RAT is notable for its unique utilization of uncompiled C# source code and the Microsoft Windows built-in csc.exe compiler.[1]

References:

  1. Grunzweig, J.. (2017, April 20). Cardinal RAT Active for Over Two Years. Retrieved December 8, 2018.
Details
Dictionary Item Added
FIELD OLD VALUE NEW VALUE
x_mitre_deprecated False
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2020-03-30 01:59:34.624000+00:00 2024-04-11 02:47:11.431000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 1.1 1.2

Description

LaZagne is a post-exploitation, open-source tool used to recover stored passwords on a system. It has modules for Windows, Linux, and OSX, but is mainly focused on Windows systems. LaZagne is publicly available on GitHub.[1]

References:

  1. Zanni, A. (n.d.). The LaZagne Project !!!. Retrieved December 14, 2018.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2023-08-03 18:35:09.021000+00:00 2024-04-04 03:49:27.035000+00:00
x_mitre_attack_spec_version 3.1.0 3.2.0
x_mitre_version 1.5 1.6
Iterable Item Added
FIELD OLD VALUE NEW VALUE
external_references {'source_name': 'GitHub LaZange Dec 2018', 'description': 'Zanni, A. (n.d.). The LaZagne Project !!!. Retrieved December 14, 2018.', 'url': 'https://github.com/AlessandroZ/LaZagne'}

Description

OSXOCEANLOTUS.D is a macOS backdoor used by APT32. First discovered in 2015, APT32 has continued to make improvements using a plugin architecture to extend capabilities, specifically using .dylib files. OSXOCEANLOTUS.D can also determine it's permission level and execute according to access type (root or user).[1][2][3]

References:

  1. Erye Hernandez and Danny Tsechansky. (2017, June 22). The New and Improved macOS Backdoor from OceanLotus. Retrieved September 8, 2023.
  2. Horejsi, J. (2018, April 04). New MacOS Backdoor Linked to OceanLotus Found. Retrieved November 13, 2018.
  3. Magisa, L. (2020, November 27). New MacOS Backdoor Connected to OceanLotus Surfaces. Retrieved December 2, 2020.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2023-10-12 20:21:08.235000+00:00 2024-04-11 00:28:52.310000+00:00
x_mitre_version 3.0 3.1

Description

KONNI is a remote access tool that security researchers assess has been used by North Korean cyber actors since at least 2014. KONNI has significant code overlap with the NOKKI malware family, and has been linked to several suspected North Korean campaigns targeting political organizations in Russia, East Asia, Europe and the Middle East; there is some evidence potentially linking KONNI to APT37.[1][2][3][4][5]

References:

  1. Rascagneres, P. (2017, May 03). KONNI: A Malware Under The Radar For Years. Retrieved November 5, 2018.
  2. Grunzweig, J., Lee, B. (2018, September 27). New KONNI Malware attacking Eurasia and Southeast Asia. Retrieved November 5, 2018.
  3. Grunzweig, J. (2018, October 01). NOKKI Almost Ties the Knot with DOGCALL: Reaper Group Uses New Malware to Deploy RAT. Retrieved November 5, 2018.
  4. Karmi, D. (2020, January 4). A Look Into Konni 2019 Campaign. Retrieved April 28, 2020.
  5. Threat Intelligence Team. (2021, August 23). New variant of Konni malware used in campaign targetting Russia. Retrieved January 5, 2022.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2022-04-13 17:26:25.143000+00:00 2024-04-11 01:44:46.026000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 2.0 2.1

Description

Impacket is an open source collection of modules written in Python for programmatically constructing and manipulating network protocols. Impacket contains several tools for remote service execution, Kerberos manipulation, Windows credential dumping, packet sniffing, and relay attacks.[1]

References:

  1. SecureAuth. (n.d.). Retrieved January 15, 2019.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2023-07-27 15:31:10.648000+00:00 2024-03-14 17:27:34.759000+00:00
x_mitre_attack_spec_version 3.1.0 3.2.0
x_mitre_version 1.5 1.6

Description

SamSam is ransomware that appeared in early 2016. Unlike some ransomware, its variants have required operators to manually interact with the malware to execute some of its core components.[1][2][3][4]

References:

  1. US-CERT. (2018, December 3). Alert (AA18-337A): SamSam Ransomware. Retrieved March 15, 2019.
  2. Ventura, V. (2018, January 22). SamSam - The Evolution Continues Netting Over $325,000 in 4 Weeks. Retrieved April 16, 2019.
  3. Palotay, D. and Mackenzie, P. (2018, April). SamSam Ransomware Chooses Its Targets Carefully. Retrieved April 15, 2019.
  4. Symantec Security Response Attack Investigation Team. (2018, October 30). SamSam: Targeted Ransomware Attacks Continue. Retrieved April 16, 2019.
Details
Dictionary Item Added
FIELD OLD VALUE NEW VALUE
x_mitre_deprecated False
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2019-04-18 20:59:56.853000+00:00 2024-04-11 00:09:42.414000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 1.0 1.1

Description

Astaroth is a Trojan and information stealer known to affect companies in Europe, Brazil, and throughout Latin America. It has been known publicly since at least late 2017. [1][2][3]

References:

  1. Salem, E. (2019, February 13). ASTAROTH MALWARE USES LEGITIMATE OS AND ANTIVIRUS PROCESSES TO STEAL PASSWORDS AND PERSONAL DATA. Retrieved April 17, 2019.
  2. Doaty, J., Garrett, P.. (2018, September 10). We’re Seeing a Resurgence of the Demonic Astaroth WMIC Trojan. Retrieved April 17, 2019.
  3. GReAT. (2020, July 14). The Tetrade: Brazilian banking malware goes global. Retrieved November 9, 2020.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2023-11-06 20:12:28.502000+00:00 2024-04-11 02:58:17.763000+00:00
x_mitre_version 2.2 2.3

Description

SpeakUp is a Trojan backdoor that targets both Linux and OSX devices. It was first observed in January 2019. [1]

References:

  1. Check Point Research. (2019, February 4). SpeakUp: A New Undetected Backdoor Linux Trojan. Retrieved April 17, 2019.
Details
Dictionary Item Added
FIELD OLD VALUE NEW VALUE
x_mitre_deprecated False
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2020-03-29 16:41:33.128000+00:00 2024-04-11 00:02:59.341000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 1.1 1.2

Description

Remexi is a Windows-based Trojan that was developed in the C programming language.[1]

References:

  1. Legezo, D. (2019, January 30). Chafer used Remexi malware to spy on Iran-based foreign diplomatic entities. Retrieved April 17, 2019.
Details
Dictionary Item Added
FIELD OLD VALUE NEW VALUE
x_mitre_deprecated False
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2020-03-30 18:04:25.880000+00:00 2024-04-11 00:17:12.008000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 1.1 1.2

Description

HOPLIGHT is a backdoor Trojan that has reportedly been used by the North Korean government.[1]

References:

  1. US-CERT. (2019, April 10). MAR-10135536-8 – North Korean Trojan: HOPLIGHT. Retrieved April 19, 2019.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2023-03-28 20:24:33.471000+00:00 2024-02-09 19:24:50.164000+00:00
x_mitre_attack_spec_version 3.1.0 3.2.0
x_mitre_version 1.2 1.3

Description

StoneDrill is wiper malware discovered in destructive campaigns against both Middle Eastern and European targets in association with APT33.[1][2]

References:

  1. O'Leary, J., et al. (2017, September 20). Insights into Iranian Cyber Espionage: APT33 Targets Aerospace and Energy Sectors and has Ties to Destructive Malware. Retrieved February 15, 2018.
  2. Kaspersky Lab. (2017, March 7). From Shamoon to StoneDrill: Wipers attacking Saudi organizations and beyond. Retrieved March 14, 2019.
Details
Dictionary Item Added
FIELD OLD VALUE NEW VALUE
x_mitre_deprecated False
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2020-03-30 18:15:28.897000+00:00 2024-04-11 00:00:54.356000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 1.1 1.2

Description

FlawedGrace is a fully featured remote access tool (RAT) written in C++ that was first observed in late 2017.[1]

References:

  1. Schwarz, D. and Proofpoint Staff. (2019, January 9). ServHelper and FlawedGrace - New malware introduced by TA505. Retrieved May 28, 2019.
Details
Dictionary Item Added
FIELD OLD VALUE NEW VALUE
x_mitre_deprecated False
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2019-06-07 18:47:42.365000+00:00 2024-04-11 02:32:31.883000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 1.0 1.1

Description

njRAT is a remote access tool (RAT) that was first observed in 2012. It has been used by threat actors in the Middle East.[1]

References:

  1. Fidelis Cybersecurity. (2013, June 28). Fidelis Threat Advisory #1009: "njRAT" Uncovered. Retrieved June 4, 2019.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2023-09-20 20:03:22.206000+00:00 2024-04-11 00:33:37.539000+00:00
x_mitre_attack_spec_version 3.1.0 3.2.0
x_mitre_version 1.5 1.6

Description

Ursnif is a banking trojan and variant of the Gozi malware observed being spread through various automated exploit kits, Spearphishing Attachments, and malicious links.[1][2] Ursnif is associated primarily with data theft, but variants also include components (backdoors, spyware, file injectors, etc.) capable of a wide variety of behaviors.[3]

References:

  1. NJCCIC. (2016, September 27). Ursnif. Retrieved June 4, 2019.
  2. Proofpoint Staff. (2016, August 25). Nightmare on Tor Street: Ursnif variant Dreambot adds Tor functionality. Retrieved June 5, 2019.
  3. Caragay, R. (2015, March 26). URSNIF: The Multifaceted Malware. Retrieved June 5, 2019.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2023-03-22 05:42:32.541000+00:00 2024-04-10 22:18:21.527000+00:00
external_references[5]['url'] https://blog.trendmicro.com/trendlabs-security-intelligence/ursnif-the-multifaceted-malware/?_ga=2.165628854.808042651.1508120821-744063452.1505819992 https://web.archive.org/web/20210719165945/https://www.trendmicro.com/en_us/research/15/c/ursnif-the-multifaceted-malware.html?_ga=2.165628854.808042651.1508120821-744063452.1505819992
x_mitre_attack_spec_version 3.1.0 3.2.0
x_mitre_version 1.4 1.5

Description

KeyBoy is malware that has been used in targeted campaigns against members of the Tibetan Parliament in 2016.[1][2]

References:

  1. Hulcoop, A., et al. (2016, November 17). It’s Parliamentary KeyBoy and the targeting of the Tibetan Community. Retrieved June 13, 2019.
  2. Parys, B. (2017, February 11). The KeyBoys are back in town. Retrieved June 13, 2019.
Details
Dictionary Item Removed
FIELD OLD VALUE NEW VALUE
x_mitre_contributors ['Bart Parys']
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2023-03-23 15:22:36.377000+00:00 2024-04-18 18:25:18.520000+00:00
x_mitre_attack_spec_version 3.1.0 3.2.0
x_mitre_version 1.2 1.3

Description

YAHOYAH is a Trojan used by Tropic Trooper as a second-stage backdoor.[1]

References:

  1. Alintanahin, K. (2015). Operation Tropic Trooper: Relying on Tried-and-Tested Flaws to Infiltrate Secret Keepers. Retrieved June 14, 2019.
Details
Dictionary Item Removed
FIELD OLD VALUE NEW VALUE
x_mitre_contributors ['Bart Parys']
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2023-03-23 15:24:22.256000+00:00 2024-04-19 13:19:32.736000+00:00
x_mitre_attack_spec_version 3.1.0 3.2.0
x_mitre_version 1.1 1.2

Description

HAWKBALL is a backdoor that was observed in targeting of the government sector in Central Asia.[1]

References:

  1. Patil, S. and Williams, M.. (2019, June 5). Government Sector in Central Asia Targeted With New HAWKBALL Backdoor Delivered via Microsoft Office Vulnerabilities. Retrieved June 20, 2019.
Details
Dictionary Item Added
FIELD OLD VALUE NEW VALUE
x_mitre_deprecated False
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2020-03-30 16:46:39.617000+00:00 2024-04-11 02:23:13.352000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 1.1 1.2

Description

HiddenWasp is a Linux-based Trojan used to target systems for remote control. It comes in the form of a statically linked ELF binary with stdlibc++.[1]

References:

  1. Sanmillan, I. (2019, May 29). HiddenWasp Malware Stings Targeted Linux Systems. Retrieved June 24, 2019.
Details
Dictionary Item Added
FIELD OLD VALUE NEW VALUE
x_mitre_deprecated False
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2021-04-23 20:07:01.487000+00:00 2024-04-11 02:19:50.306000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 1.2 1.3

Description

LightNeuron is a sophisticated backdoor that has targeted Microsoft Exchange servers since at least 2014. LightNeuron has been used by Turla to target diplomatic and foreign affairs-related organizations. The presence of certain strings in the malware suggests a Linux variant of LightNeuron exists.[1]

References:

  1. Faou, M. (2019, May). Turla LightNeuron: One email away from remote code execution. Retrieved June 24, 2019.
Details
Dictionary Item Added
FIELD OLD VALUE NEW VALUE
x_mitre_deprecated False
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2020-03-30 02:59:20.670000+00:00 2024-04-11 01:37:19.602000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 1.1 1.2

Description

HyperBro is a custom in-memory backdoor used by Threat Group-3390.[1][2][3]

References:

  1. Falcone, R. and Lancaster, T. (2019, May 28). Emissary Panda Attacks Middle East Government Sharepoint Servers. Retrieved July 9, 2019.
  2. Legezo, D. (2018, June 13). LuckyMouse hits national data center to organize country-level waterholing campaign. Retrieved August 18, 2018.
  3. Khandelwal, S. (2018, June 14). Chinese Hackers Carried Out Country-Level Watering Hole Attack. Retrieved August 18, 2018.
Details
Dictionary Item Added
FIELD OLD VALUE NEW VALUE
x_mitre_deprecated False
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2021-11-29 21:48:51.029000+00:00 2024-04-11 02:16:42.727000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 1.2 1.3

Description

Exaramel for Linux is a backdoor written in the Go Programming Language and compiled as a 64-bit ELF binary. The Windows version is tracked separately under Exaramel for Windows.[1]

References:

  1. Cherepanov, A., Lipovsky, R. (2018, October 11). New TeleBots backdoor: First evidence linking Industroyer to NotPetya. Retrieved November 27, 2018.
Details
Dictionary Item Added
FIELD OLD VALUE NEW VALUE
x_mitre_deprecated False
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2021-04-14 22:43:50.451000+00:00 2024-04-11 02:34:14.304000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 1.2 1.3

Description

Fysbis is a Linux-based backdoor used by APT28 that dates back to at least 2014.[1]

References:

  1. Bryan Lee and Rob Downs. (2016, February 12). A Look Into Fysbis: Sofacy’s Linux Backdoor. Retrieved September 10, 2017.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2023-10-01 16:58:20.224000+00:00 2024-04-11 02:29:45.766000+00:00
x_mitre_version 1.3 1.4

Description

BOOSTWRITE is a loader crafted to be launched via abuse of the DLL search order of applications used by FIN7.[1]

References:

  1. Carr, N, et all. (2019, October 10). Mahalo FIN7: Responding to the Criminal Operators’ New Tools and Techniques. Retrieved October 11, 2019.
Details
Dictionary Item Added
FIELD OLD VALUE NEW VALUE
x_mitre_deprecated False
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2019-10-15 17:07:57.638000+00:00 2024-04-11 02:48:51.475000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 1.0 1.1

Description

Winnti for Linux is a trojan, seen since at least 2015, designed specifically for targeting Linux systems. Reporting indicates the winnti malware family is shared across a number of actors including Winnti Group. The Windows variant is tracked separately under Winnti for Windows.[1]

References:

  1. Chronicle Blog. (2019, May 15). Winnti: More than just Windows and Gates. Retrieved April 29, 2020.
Details
Dictionary Item Added
FIELD OLD VALUE NEW VALUE
x_mitre_deprecated False
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2020-07-01 18:34:02.367000+00:00 2024-04-10 20:36:12.150000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 1.0 1.1

Description

HotCroissant is a remote access trojan (RAT) attributed by U.S. government entities to malicious North Korean government cyber activity, tracked collectively as HIDDEN COBRA.[1] HotCroissant shares numerous code similarities with Rifdoor.[2]

References:

  1. US-CERT. (2020, February 20). MAR-10271944-1.v1 – North Korean Trojan: HOTCROISSANT. Retrieved May 1, 2020.
  2. Knight, S.. (2020, April 16). VMware Carbon Black TAU Threat Analysis: The Evolution of Lazarus. Retrieved May 1, 2020.
Details
Dictionary Item Added
FIELD OLD VALUE NEW VALUE
x_mitre_deprecated False
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2020-05-06 19:28:21.746000+00:00 2024-04-11 02:17:38.807000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 1.0 1.1

Description

Rifdoor is a remote access trojan (RAT) that shares numerous code similarities with HotCroissant.[1]

References:

  1. Knight, S.. (2020, April 16). VMware Carbon Black TAU Threat Analysis: The Evolution of Lazarus. Retrieved May 1, 2020.
Details
Dictionary Item Added
FIELD OLD VALUE NEW VALUE
x_mitre_deprecated False
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2020-05-08 00:24:24.402000+00:00 2024-04-11 00:14:59.199000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 1.0 1.1

Description

Attor is a Windows-based espionage platform that has been seen in use since 2013. Attor has a loadable plugin architecture to customize functionality for specific targets.[1]

References:

  1. Hromcova, Z. (2019, October). AT COMMANDS, TOR-BASED COMMUNICATIONS: MEET ATTOR, A FANTASY CREATURE AND ALSO A SPY PLATFORM. Retrieved May 6, 2020.
Details
Dictionary Item Added
FIELD OLD VALUE NEW VALUE
x_mitre_deprecated False
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2020-07-07 12:35:11.897000+00:00 2024-04-11 02:57:38.076000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 1.0 1.1

Description

Rising Sun is a modular backdoor that was used extensively in Operation Sharpshooter between 2017 and 2019. Rising Sun infected at least 87 organizations around the world, including nuclear, defense, energy, and financial service companies. Security researchers assessed Rising Sun included some source code from Lazarus Group's Trojan Duuzer.[1]

References:

  1. Sherstobitoff, R., Malhotra, A., et. al.. (2018, December 18). Operation Sharpshooter Campaign Targets Global Defense, Critical Infrastructure. Retrieved May 14, 2020.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2022-10-13 15:46:29.677000+00:00 2024-04-11 00:14:23.264000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 2.0 2.1

Description

LoudMiner is a cryptocurrency miner which uses virtualization software to siphon system resources. The miner has been bundled with pirated copies of Virtual Studio Technology (VST) for Windows and macOS.[1]

References:

  1. Malik, M. (2019, June 20). LoudMiner: Cross-platform mining in cracked VST software. Retrieved May 18, 2020.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2023-03-22 04:51:42.922000+00:00 2024-04-11 01:36:42.906000+00:00
x_mitre_attack_spec_version 3.1.0 3.2.0
x_mitre_version 1.3 1.4

Description

Metamorfo is a Latin-American banking trojan operated by a Brazilian cybercrime group that has been active since at least April 2018. The group focuses on targeting banks and cryptocurrency services in Brazil and Mexico.[1][2]

References:

  1. Erlich, C. (2020, April 3). The Avast Abuser: Metamorfo Banking Malware Hides By Abusing Avast Executable. Retrieved May 26, 2020.
  2. ESET Research. (2019, October 3). Casbaneiro: peculiarities of this banking Trojan that affects Brazil and Mexico. Retrieved September 23, 2021.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2022-10-18 23:23:55.295000+00:00 2024-04-11 00:44:30.028000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 2.0 2.1

Description

Aria-body is a custom backdoor that has been used by Naikon since approximately 2017.[1]

References:

  1. CheckPoint. (2020, May 7). Naikon APT: Cyber Espionage Reloaded. Retrieved May 26, 2020.
Details
Dictionary Item Added
FIELD OLD VALUE NEW VALUE
x_mitre_deprecated False
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2021-08-19 17:58:43.342000+00:00 2024-04-11 02:58:53.131000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 1.1 1.2

Description

CARROTBAT is a customized dropper that has been in use since at least 2017. CARROTBAT has been used to install SYSCON and has infrastructure overlap with KONNI.[1][2]

References:

  1. Grunzweig, J. and Wilhoit, K. (2018, November 29). The Fractured Block Campaign: CARROTBAT Used to Deliver Malware Targeting Southeast Asia. Retrieved June 2, 2020.
  2. McCabe, A. (2020, January 23). The Fractured Statue Campaign: U.S. Government Agency Targeted in Spear-Phishing Attacks. Retrieved June 2, 2020.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2023-03-22 03:24:06.264000+00:00 2024-04-11 02:46:42.264000+00:00
x_mitre_attack_spec_version 3.1.0 3.2.0
x_mitre_version 1.1 1.2

Description

WindTail is a macOS surveillance implant used by Windshift. WindTail shares code similarities with Hack Back aka KitM OSX.[1][2][3]

References:

  1. Karim, T. (2018, August). TRAILS OF WINDSHIFT. Retrieved June 25, 2020.
  2. Wardle, Patrick. (2018, December 20). Middle East Cyber-Espionage analyzing WindShift's implant: OSX.WindTail (part 1). Retrieved October 3, 2019.
  3. Wardle, Patrick. (2019, January 15). Middle East Cyber-Espionage analyzing WindShift's implant: OSX.WindTail (part 2). Retrieved October 3, 2019.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2022-04-20 22:03:11.833000+00:00 2024-04-10 20:39:43.747000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 1.0 1.1

Description

Skidmap is a kernel-mode rootkit used for cryptocurrency mining.[1]

References:

  1. Remillano, A., Urbanec, J. (2019, September 19). Skidmap Linux Malware Uses Rootkit Capabilities to Hide Cryptocurrency-Mining Payload. Retrieved June 4, 2020.
Details
Dictionary Item Added
FIELD OLD VALUE NEW VALUE
x_mitre_deprecated False
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2020-06-26 04:03:50.568000+00:00 2024-04-11 00:06:31.222000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 1.0 1.1

Description

Avenger is a downloader that has been used by BRONZE BUTLER since at least 2019.[1]

References:

  1. Chen, J. et al. (2019, November). Operation ENDTRADE: TICK’s Multi-Stage Backdoors for Attacking Industries and Stealing Classified Data. Retrieved June 9, 2020.
Details
Dictionary Item Added
FIELD OLD VALUE NEW VALUE
x_mitre_deprecated False
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2020-06-24 17:44:18.663000+00:00 2024-04-11 02:56:34.181000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 1.0 1.1

Description

IcedID is a modular banking malware designed to steal financial information that has been observed in the wild since at least 2017. IcedID has been downloaded by Emotet in multiple campaigns.[1][2]

References:

  1. Kessem, L., et al. (2017, November 13). New Banking Trojan IcedID Discovered by IBM X-Force Research. Retrieved July 14, 2020.
  2. Kimayong, P. (2020, June 18). COVID-19 and FMLA Campaigns used to install new IcedID banking malware. Retrieved July 14, 2020.
Details
Dictionary Item Added
FIELD OLD VALUE NEW VALUE
x_mitre_deprecated False
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2020-08-14 14:25:53.721000+00:00 2024-04-11 02:16:08.503000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 1.0 1.1

Description

Carberp is a credential and information stealing malware that has been active since at least 2009. Carberp's source code was leaked online in 2013, and subsequently used as the foundation for the Carbanak backdoor.[1][2][3]

References:

  1. Trend Micro. (2014, February 27). CARBERP. Retrieved July 29, 2020.
  2. Kaspersky Lab's Global Research & Analysis Team. (2015, February). CARBANAK APT THE GREAT BANK ROBBERY. Retrieved March 27, 2017.
  3. RSA. (2017, November 21). THE CARBANAK/FIN7 SYNDICATE A HISTORICAL OVERVIEW OF AN EVOLVING THREAT. Retrieved July 29, 2020.
Details
Dictionary Item Added
FIELD OLD VALUE NEW VALUE
x_mitre_deprecated False
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2021-08-25 20:08:29.545000+00:00 2024-04-11 02:47:56.829000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 1.1 1.2

Description

Kessel is an advanced version of OpenSSH which acts as a custom backdoor, mainly acting to steal credentials and function as a bot. Kessel has been active since its C2 domain began resolving in August 2018.[1]

References:

  1. Dumont, R., M.Léveillé, M., Porcher, H. (2018, December 1). THE DARK SIDE OF THE FORSSHE A landscape of OpenSSH backdoors. Retrieved July 16, 2020.
Details
Dictionary Item Added
FIELD OLD VALUE NEW VALUE
x_mitre_deprecated False
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2020-08-10 19:43:38.144000+00:00 2024-04-11 01:48:38.105000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 1.0 1.1

Description

CrackMapExec, or CME, is a post-exploitation tool developed in Python and designed for penetration testing against networks. CrackMapExec collects Active Directory information to conduct lateral movement through targeted networks.[1]

References:

  1. byt3bl33d3r. (2018, September 8). SMB: Command Reference. Retrieved July 17, 2020.
Details
Dictionary Item Added
FIELD OLD VALUE NEW VALUE
x_mitre_deprecated False
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2020-07-29 20:19:40.544000+00:00 2024-03-14 17:29:49.200000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 1.0 1.1

Description

StrongPity is an information stealing malware used by PROMETHIUM.[1][2]

References:

  1. Tudorica, R. et al. (2020, June 30). StrongPity APT - Revealing Trojanized Tools, Working Hours and Infrastructure. Retrieved July 20, 2020.
  2. Mercer, W. et al. (2020, June 29). PROMETHIUM extends global reach with StrongPity3 APT. Retrieved July 20, 2020.
Details
Dictionary Item Added
FIELD OLD VALUE NEW VALUE
x_mitre_deprecated False
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2020-10-15 02:00:29.185000+00:00 2024-04-10 23:47:16.416000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 1.0 1.1

Description

GoldenSpy is a backdoor malware which has been packaged with legitimate tax preparation software. GoldenSpy was discovered targeting organizations in China, being delivered with the "Intelligent Tax" software suite which is produced by the Golden Tax Department of Aisino Credit Information Co. and required to pay local taxes.[1]

References:

  1. Trustwave SpiderLabs. (2020, June 25). The Golden Tax Department and Emergence of GoldenSpy Malware. Retrieved July 23, 2020.
Details
Dictionary Item Added
FIELD OLD VALUE NEW VALUE
x_mitre_deprecated False
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2020-08-19 16:31:40.508000+00:00 2024-04-11 02:27:23.911000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 1.0 1.1

Description

REvil is a ransomware family that has been linked to the GOLD SOUTHFIELD group and operated as ransomware-as-a-service (RaaS) since at least April 2019. REvil, which as been used against organizations in the manufacturing, transportation, and electric sectors, is highly configurable and shares code similarities with the GandCrab RaaS.[1][2][3]

References:

  1. Counter Threat Unit Research Team. (2019, September 24). REvil/Sodinokibi Ransomware. Retrieved August 4, 2020.
  2. Intel 471 Malware Intelligence team. (2020, March 31). REvil Ransomware-as-a-Service – An analysis of a ransomware affiliate operation. Retrieved August 4, 2020.
  3. Group IB. (2020, May). Ransomware Uncovered: Attackers’ Latest Methods. Retrieved August 5, 2020.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2023-03-26 20:06:33.317000+00:00 2024-04-11 00:15:32.724000+00:00
x_mitre_attack_spec_version 3.1.0 3.2.0
x_mitre_version 2.1 2.2

Description

Dacls is a multi-platform remote access tool used by Lazarus Group since at least December 2019.[1][2]

References:

  1. Mabutas, G. (2020, May 11). New MacOS Dacls RAT Backdoor Shows Lazarus’ Multi-Platform Attack Capability. Retrieved August 10, 2020.
  2. Stokes, P. (2020, July 27). Four Distinct Families of Lazarus Malware Target Apple’s macOS Platform. Retrieved August 7, 2020.
Details
Dictionary Item Added
FIELD OLD VALUE NEW VALUE
x_mitre_deprecated False
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2020-09-02 18:48:58.442000+00:00 2024-04-11 02:43:00.252000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 1.0 1.1

Description

PipeMon is a multi-stage modular backdoor used by Winnti Group.[1]

References:

  1. Tartare, M. et al. (2020, May 21). No “Game over” for the Winnti Group. Retrieved August 24, 2020.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2023-03-26 19:38:46.705000+00:00 2024-04-11 00:26:37.214000+00:00
x_mitre_attack_spec_version 3.1.0 3.2.0
x_mitre_version 1.1 1.2

Description

Anchor is one of a family of backdoor malware that has been used in conjunction with TrickBot on selected high profile targets since at least 2018.[1][2]

References:

  1. Dahan, A. et al. (2019, December 11). DROPPING ANCHOR: FROM A TRICKBOT INFECTION TO THE DISCOVERY OF THE ANCHOR MALWARE. Retrieved September 10, 2020.
  2. Grange, W. (2020, July 13). Anchor_dns malware goes cross platform. Retrieved September 10, 2020.
Details
Dictionary Item Added
FIELD OLD VALUE NEW VALUE
x_mitre_deprecated False
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2021-12-15 20:56:24.628000+00:00 2023-12-04 20:02:47.052000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 1.0 1.1

Description

BLINDINGCAN is a remote access Trojan that has been used by the North Korean government since at least early 2020 in cyber operations against defense, engineering, and government organizations in Western Europe and the US.[1][2]

References:

  1. US-CERT. (2020, August 19). MAR-10295134-1.v1 – North Korean Remote Access Trojan: BLINDINGCAN. Retrieved August 19, 2020.
  2. NHS Digital . (2020, August 20). BLINDINGCAN Remote Access Trojan. Retrieved August 20, 2020.
Details
Dictionary Item Added
FIELD OLD VALUE NEW VALUE
x_mitre_deprecated False
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2021-03-17 15:55:56.257000+00:00 2024-04-11 02:51:38.922000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 1.0 1.1

Description

KGHSPY is a modular suite of tools used by Kimsuky for reconnaissance, information stealing, and backdoor capabilities. KGHSPY derived its name from PDB paths and internal names found in samples containing "KGH".[1]

References:

  1. Dahan, A. et al. (2020, November 2). Back to the Future: Inside the Kimsuky KGH Spyware Suite. Retrieved November 6, 2020.
Details
Dictionary Item Added
FIELD OLD VALUE NEW VALUE
x_mitre_deprecated False
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2021-04-22 13:42:18.822000+00:00 2024-04-11 01:45:40.875000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 1.0 1.1

Description

Melcoz is a banking trojan family built from the open source tool Remote Access PC. Melcoz was first observed in attacks in Brazil and since 2018 has spread to Chile, Mexico, Spain, and Portugal.[1]

References:

  1. GReAT. (2020, July 14). The Tetrade: Brazilian banking malware goes global. Retrieved November 9, 2020.
Details
Dictionary Item Added
FIELD OLD VALUE NEW VALUE
x_mitre_deprecated False
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2020-12-22 21:20:18.142000+00:00 2024-03-29 18:12:59.212000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 1.0 1.1

Description

Grandoreiro is a banking trojan written in Delphi that was first observed in 2016 and uses a Malware-as-a-Service (MaaS) business model. Grandoreiro has confirmed victims in Brazil, Mexico, Portugal, and Spain.[1][2]

References:

  1. GReAT. (2020, July 14). The Tetrade: Brazilian banking malware goes global. Retrieved November 9, 2020.
  2. ESET. (2020, April 28). Grandoreiro: How engorged can an EXE get?. Retrieved November 13, 2020.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2023-03-26 19:05:29.235000+00:00 2024-04-11 02:25:51.549000+00:00
x_mitre_attack_spec_version 3.1.0 3.2.0
x_mitre_version 1.1 1.2

Description

Bazar is a downloader and backdoor that has been used since at least April 2020, with infections primarily against professional services, healthcare, manufacturing, IT, logistics and travel companies across the US and Europe. Bazar reportedly has ties to TrickBot campaigns and can be used to deploy additional malware, including ransomware, and to steal sensitive data.[1]

References:

  1. Cybereason Nocturnus. (2020, July 16). A BAZAR OF TRICKS: FOLLOWING TEAM9’S DEVELOPMENT CYCLES. Retrieved November 18, 2020.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2022-09-29 20:41:20.065000+00:00 2023-12-04 19:42:13.073000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 1.2 2.0
Iterable Item Added
FIELD OLD VALUE NEW VALUE
external_references {'source_name': 'Bazaloader', 'description': '(Citation: Microsoft Ransomware as a Service)'}
external_references {'source_name': 'Microsoft Ransomware as a Service', 'description': 'Microsoft. (2022, May 9). Ransomware as a service: Understanding the cybercrime gig economy and how to protect yourself. Retrieved March 10, 2023.', 'url': 'https://www.microsoft.com/en-us/security/blog/2022/05/09/ransomware-as-a-service-understanding-the-cybercrime-gig-economy-and-how-to-protect-yourself/'}
x_mitre_aliases Bazaloader

Description

SUNBURST is a trojanized DLL designed to fit within the SolarWinds Orion software update framework. It was used by APT29 since at least February 2020.[1][2]

References:

  1. Sudhakar Ramakrishna . (2021, January 11). New Findings From Our Investigation of SUNBURST. Retrieved January 13, 2021.
  2. MSTIC, CDOC, 365 Defender Research Team. (2021, January 20). Deep dive into the Solorigate second-stage activation: From SUNBURST to TEARDROP and Raindrop . Retrieved January 22, 2021.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2023-03-27 20:01:39.552000+00:00 2023-12-26 19:44:49.643000+00:00
x_mitre_attack_spec_version 3.1.0 3.2.0
x_mitre_version 2.4 2.5

Description

Raindrop is a loader used by APT29 that was discovered on some victim machines during investigations related to the SolarWinds Compromise. It was discovered in January 2021 and was likely used since at least May 2020.[1][2]

References:

  1. Symantec Threat Hunter Team. (2021, January 18). Raindrop: New Malware Discovered in SolarWinds Investigation. Retrieved January 19, 2021.
  2. MSTIC, CDOC, 365 Defender Research Team. (2021, January 20). Deep dive into the Solorigate second-stage activation: From SUNBURST to TEARDROP and Raindrop . Retrieved January 22, 2021.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2023-03-27 19:53:24.461000+00:00 2024-04-11 00:23:21.599000+00:00
x_mitre_attack_spec_version 3.1.0 3.2.0
x_mitre_version 1.2 1.3

Description

BitPaymer is a ransomware variant first observed in August 2017 targeting hospitals in the U.K. BitPaymer uses a unique encryption key, ransom note, and contact information for each operation. BitPaymer has several indicators suggesting overlap with the Dridex malware and is often delivered via Dridex.[1]

References:

  1. Frankoff, S., Hartley, B. (2018, November 14). Big Game Hunting: The Evolution of INDRIK SPIDER From Dridex Wire Fraud to BitPaymer Targeted Ransomware. Retrieved January 6, 2021.
Details
Dictionary Item Added
FIELD OLD VALUE NEW VALUE
x_mitre_deprecated False
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2021-04-26 22:04:32.509000+00:00 2024-04-11 02:52:57.879000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 1.0 1.1

Description

BendyBear is an x64 shellcode for a stage-zero implant designed to download malware from a C2 server. First discovered in August 2020, BendyBear shares a variety of features with Waterbear, malware previously attributed to the Chinese cyber espionage group BlackTech.[1]

References:

  1. Harbison, M. (2021, February 9). BendyBear: Novel Chinese Shellcode Linked With Cyber Espionage Group BlackTech. Retrieved February 16, 2021.
Details
Dictionary Item Added
FIELD OLD VALUE NEW VALUE
x_mitre_deprecated False
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2021-04-21 15:02:21.066000+00:00 2024-04-11 02:54:10.246000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 1.0 1.1

Description

SUPERNOVA is an in-memory web shell written in .NET C#. It was discovered in November 2020 during the investigation of APT29's SolarWinds cyber operation but determined to be unrelated. Subsequent analysis suggests SUPERNOVA may have been used by the China-based threat group SPIRAL.[1][2][3][4][5]

References:

  1. Riley, W. (2020, December 1). SUPERNOVA SolarWinds .NET Webshell Analysis. Retrieved February 18, 2021.
  2. Tennis, M. (2020, December 17). SUPERNOVA: A Novel .NET Webshell. Retrieved February 22, 2021.
  3. SolarWinds. (2020, December 24). SolarWinds Security Advisory. Retrieved February 22, 2021.
  4. CISA. (2021, January 27). Malware Analysis Report (AR21-027A). Retrieved February 22, 2021.
  5. MSTIC. (2020, December 18). Analyzing Solorigate, the compromised DLL file that started a sophisticated cyberattack, and how Microsoft Defender helps protect customers . Retrieved January 5, 2021.
Details
Dictionary Item Added
FIELD OLD VALUE NEW VALUE
x_mitre_deprecated False
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2021-04-23 23:00:41.648000+00:00 2024-04-10 23:45:34.261000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 1.0 1.1

Description

Waterbear is modular malware attributed to BlackTech that has been used primarily for lateral movement, decrypting, and triggering payloads and is capable of hiding network behaviors.[1]

References:

  1. Su, V. et al. (2019, December 11). Waterbear Returns, Uses API Hooking to Evade Security. Retrieved February 22, 2021.
Details
Dictionary Item Added
FIELD OLD VALUE NEW VALUE
x_mitre_deprecated False
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2022-03-25 16:46:35.932000+00:00 2024-04-10 22:14:28.440000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 1.1 1.2

Description

IronNetInjector is a Turla toolchain that utilizes scripts from the open-source IronPython implementation of Python with a .NET injector to drop one or more payloads including ComRAT.[1]

References:

  1. Reichel, D. (2021, February 19). IronNetInjector: Turla’s New Malware Loading Tool. Retrieved February 24, 2021.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2022-05-20 17:02:59.587000+00:00 2024-04-11 02:14:36.791000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 1.0 1.1

Description

Penquin is a remote access trojan (RAT) with multiple versions used by Turla to target Linux systems since at least 2014.[1][2]

References:

  1. Baumgartner, K. and Raiu, C. (2014, December 8). The ‘Penquin’ Turla. Retrieved March 11, 2021.
  2. Leonardo. (2020, May 29). MALWARE TECHNICAL INSIGHT TURLA “Penquin_x64”. Retrieved March 11, 2021.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2022-10-20 04:12:29.037000+00:00 2024-04-11 00:27:30.199000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 1.1 1.2

Description

GoldMax is a second-stage C2 backdoor written in Go with Windows and Linux variants that are nearly identical in functionality. GoldMax was discovered in early 2021 during the investigation into the SolarWinds Compromise, and has likely been used by APT29 since at least mid-2019. GoldMax uses multiple defense evasion techniques, including avoiding virtualization execution and masking malicious traffic.[1][2][3]

References:

  1. Nafisi, R., Lelli, A. (2021, March 4). GoldMax, GoldFinder, and Sibot: Analyzing NOBELIUM’s layered persistence. Retrieved March 8, 2021.
  2. Smith, L., Leathery, J., Read, B. (2021, March 4). New SUNSHUTTLE Second-Stage Backdoor Uncovered Targeting U.S.-Based Entity; Possible Connection to UNC2452. Retrieved March 12, 2021.
  3. CrowdStrike. (2022, January 27). Early Bird Catches the Wormhole: Observations from the StellarParticle Campaign. Retrieved February 7, 2022.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2023-08-30 16:31:52.140000+00:00 2024-04-11 02:26:45.606000+00:00
x_mitre_attack_spec_version 3.1.0 3.2.0
x_mitre_version 2.2 2.3

Description

Hildegard is malware that targets misconfigured kubelets for initial access and runs cryptocurrency miner operations. The malware was first observed in January 2021. The TeamTNT activity group is believed to be behind Hildegard. [1]

References:

  1. Chen, J. et al. (2021, February 3). Hildegard: New TeamTNT Cryptojacking Malware Targeting Kubernetes. Retrieved April 5, 2021.
Details
Dictionary Item Added
FIELD OLD VALUE NEW VALUE
x_mitre_deprecated False
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2021-10-16 01:49:39.189000+00:00 2024-04-11 02:18:41.342000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 1.1 1.2

Description

Stuxnet was the first publicly reported piece of malware to specifically target industrial control systems devices. Stuxnet is a large and complex piece of malware that utilized multiple different behaviors including multiple zero-day vulnerabilities, a sophisticated Windows rootkit, and network infection routines.[1][2][3][4] Stuxnet was discovered in 2010, with some components being used as early as November 2008.[1]

References:

  1. Nicolas Falliere, Liam O Murchu, Eric Chien 2011, February W32.Stuxnet Dossier (Version 1.4) Retrieved. 2017/09/22
  2. CISA. (2010, September 10). ICS Advisory (ICSA-10-272-01). Retrieved December 7, 2020.
  3. Matrosov, A., Rodionov, E., Harley, D., Malcho, J.. (n.d.). Stuxnet Under the Microscope. Retrieved December 7, 2020.
  4. Ralph Langner. (2013, November). To Kill a Centrifuge: A Technical Analysis of What Stuxnet's Creators Tried to Achieve. Retrieved December 7, 2020.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2023-03-20 13:50:55.168000+00:00 2024-04-10 23:46:32.577000+00:00
x_mitre_attack_spec_version 3.1.0 3.2.0
x_mitre_version 1.3 1.4

Description

Industroyer is a sophisticated malware framework designed to cause an impact to the working processes of Industrial Control Systems (ICS), specifically components used in electrical substations.[1] Industroyer was used in the attacks on the Ukrainian power grid in December 2016.[2] This is the first publicly known malware specifically designed to target and impact operations in the electric grid.[3]

References:

  1. Anton Cherepanov. (2017, June 12). Win32/Industroyer: A new threat for industrial controls systems. Retrieved December 18, 2020.
  2. Dragos Inc.. (2017, June 13). CRASHOVERRIDE Analysis of the Threat to Electric Grid Operations. Retrieved December 18, 2020.
  3. Joe Slowik. (2018, October 12). Anatomy of an Attack: Detecting and Defeating CRASHOVERRIDE. Retrieved December 18, 2020.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2023-10-17 20:09:38.062000+00:00 2024-04-11 16:06:34.700000+00:00
x_mitre_contributors[0] Dragos Threat Intelligence Dragos Threat Intelligence

Description

WastedLocker is a ransomware family attributed to Indrik Spider that has been used since at least May 2020. WastedLocker has been used against a broad variety of sectors, including manufacturing, information technology, and media.[1][2][3]

References:

  1. Symantec Threat Intelligence. (2020, June 25). WastedLocker: Symantec Identifies Wave of Attacks Against U.S. Organizations. Retrieved May 20, 2021.
  2. Antenucci, S., Pantazopoulos, N., Sandee, M. (2020, June 23). WastedLocker: A New Ransomware Variant Developed By The Evil Corp Group. Retrieved September 14, 2021.
  3. Walter, J.. (2020, July 23). WastedLocker Ransomware: Abusing ADS and NTFS File Attributes. Retrieved September 14, 2021.
Details
Dictionary Item Added
FIELD OLD VALUE NEW VALUE
x_mitre_deprecated False
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2021-09-27 17:36:37.593000+00:00 2024-03-25 19:46:59.150000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 1.0 1.1

Description

PS1 is a loader that was used to deploy 64-bit backdoors in the CostaRicto campaign.[1]

References:

  1. The BlackBerry Research and Intelligence Team. (2020, November 12). The CostaRicto Campaign: Cyber-Espionage Outsourced. Retrieved May 24, 2021.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2022-10-05 16:04:51.193000+00:00 2024-04-11 00:25:13.397000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 1.1 1.2

Description

FIVEHANDS is a customized version of DEATHRANSOM ransomware written in C++. FIVEHANDS has been used since at least 2021, including in Ransomware-as-a-Service (RaaS) campaigns, sometimes along with SombRAT.[1][2]

References:

  1. McLellan, T. and Moore, J. et al. (2021, April 29). UNC2447 SOMBRAT and FIVEHANDS Ransomware: A Sophisticated Financial Threat. Retrieved June 2, 2021.
  2. Matthews, M. and Backhouse, W. (2021, June 15). Handy guide to a new Fivehands ransomware variant. Retrieved June 24, 2021.
Details
Dictionary Item Added
FIELD OLD VALUE NEW VALUE
x_mitre_deprecated False
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2021-10-18 17:52:32.865000+00:00 2024-04-11 02:33:06.963000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 1.0 1.1

Description

RainyDay is a backdoor tool that has been used by Naikon since at least 2020.[1]

References:

  1. Vrabie, V. (2021, April 23). NAIKON – Traces from a Military Cyber-Espionage Operation. Retrieved June 29, 2021.
Details
Dictionary Item Added
FIELD OLD VALUE NEW VALUE
x_mitre_deprecated False
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2021-08-19 19:14:14.922000+00:00 2024-04-11 00:22:35.591000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 1.0 1.1

Description

Sliver is an open source, cross-platform, red team command and control framework written in Golang.[1]

References:

  1. Kervella, R. (2019, August 4). Cross-platform General Purpose Implant Framework Written in Golang. Retrieved July 30, 2021.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2023-01-17 22:14:02.852000+00:00 2024-04-11 00:06:01.264000+00:00
x_mitre_attack_spec_version 3.1.0 3.2.0
x_mitre_version 1.1 1.2

Description

EnvyScout is a dropper that has been used by APT29 since at least 2021.[1]

References:

  1. MSTIC. (2021, May 28). Breaking down NOBELIUM’s latest early-stage toolset. Retrieved August 4, 2021.
Details
Dictionary Item Added
FIELD OLD VALUE NEW VALUE
x_mitre_deprecated False
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2021-10-16 01:24:29.056000+00:00 2024-04-11 02:34:42.912000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 1.0 1.1

Description

QakBot is a modular banking trojan that has been used primarily by financially-motivated actors since at least 2007. QakBot is continuously maintained and developed and has evolved from an information stealer into a delivery agent for ransomware, most notably ProLock and Egregor.[1][2][3][4]

References:

  1. Trend Micro. (2020, December 17). QAKBOT: A decade-old malware still with new tricks. Retrieved September 27, 2021.
  2. Rainey, K. (n.d.). Qbot. Retrieved September 27, 2021.
  3. Kuzmenko, A. et al. (2021, September 2). QakBot technical analysis. Retrieved September 27, 2021.
  4. Morrow, D. (2021, April 15). The rise of QakBot. Retrieved September 27, 2021.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2023-05-01 17:05:20.902000+00:00 2023-12-05 20:22:37.368000+00:00
x_mitre_attack_spec_version 3.1.0 3.2.0
x_mitre_version 1.1 1.2

Description

BLUELIGHT is a remote access Trojan used by APT37 that was first observed in early 2021.[1]

References:

  1. Cash, D., Grunzweig, J., Meltzer, M., Adair, S., Lancaster, T. (2021, August 17). North Korean APT InkySquid Infects Victims Using Browser Exploits. Retrieved September 30, 2021.
Details
Dictionary Item Added
FIELD OLD VALUE NEW VALUE
x_mitre_deprecated False
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2021-10-15 21:00:52.016000+00:00 2024-04-11 02:49:24.851000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 1.0 1.1

Modified Description View changes side-by-side
[Diavol](https://attack.mitre.org/software/S0659) is a ransomware variant first observed in June 2021 that is capable of prioritizing file types to encrypt based on a pre-configured list of extensions defined by the attacker. The [Diavol](https://attack.mitre.org/software/S0659) Ransomware-as-a Service (RaaS) program is managed by [Wizard Spider](https://attack.mitre.org/groups/G0102) and it has been observed being deployed by [Bazar](https://attack.mitre.org/software/S0534) and is thought to have potential ties to [Wizard Spider](https://attack.mitre.org/groups/G0102).(Citation: [Bazar](https://attack.mitre.org/software/S0534).(Citation: Fortinet Diavol July 2021)(Citation: FBI Flash Diavol January 2022)(Citation: DFIR Diavol Ransomware December 2021) 2021)(Citation: Microsoft Ransomware as a Service)
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2022-04-15 00:59:33.522000+00:00 2023-12-04 20:15:22.258000+00:00
description [Diavol](https://attack.mitre.org/software/S0659) is a ransomware variant first observed in June 2021 that is capable of prioritizing file types to encrypt based on a pre-configured list of extensions defined by the attacker. [Diavol](https://attack.mitre.org/software/S0659) has been deployed by [Bazar](https://attack.mitre.org/software/S0534) and is thought to have potential ties to [Wizard Spider](https://attack.mitre.org/groups/G0102).(Citation: Fortinet Diavol July 2021)(Citation: FBI Flash Diavol January 2022)(Citation: DFIR Diavol Ransomware December 2021) [Diavol](https://attack.mitre.org/software/S0659) is a ransomware variant first observed in June 2021 that is capable of prioritizing file types to encrypt based on a pre-configured list of extensions defined by the attacker. The [Diavol](https://attack.mitre.org/software/S0659) Ransomware-as-a Service (RaaS) program is managed by [Wizard Spider](https://attack.mitre.org/groups/G0102) and it has been observed being deployed by [Bazar](https://attack.mitre.org/software/S0534).(Citation: Fortinet Diavol July 2021)(Citation: FBI Flash Diavol January 2022)(Citation: DFIR Diavol Ransomware December 2021)(Citation: Microsoft Ransomware as a Service)
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 1.0 2.0
Iterable Item Added
FIELD OLD VALUE NEW VALUE
external_references {'source_name': 'Microsoft Ransomware as a Service', 'description': 'Microsoft. (2022, May 9). Ransomware as a service: Understanding the cybercrime gig economy and how to protect yourself. Retrieved March 10, 2023.', 'url': 'https://www.microsoft.com/en-us/security/blog/2022/05/09/ransomware-as-a-service-understanding-the-cybercrime-gig-economy-and-how-to-protect-yourself/'}

Description

FoggyWeb is a passive and highly-targeted backdoor capable of remotely exfiltrating sensitive information from a compromised Active Directory Federated Services (AD FS) server. It has been used by APT29 since at least early April 2021.[1]

References:

  1. Ramin Nafisi. (2021, September 27). FoggyWeb: Targeted NOBELIUM malware leads to persistent backdoor. Retrieved October 4, 2021.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2022-04-15 16:34:44.709000+00:00 2024-04-11 02:32:04.884000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 1.0 1.1

Description

RCSession is a backdoor written in C++ that has been in use since at least 2018 by Mustang Panda and by Threat Group-3390 (Type II Backdoor).[1][2][3]

References:

  1. Counter Threat Unit Research Team. (2019, December 29). BRONZE PRESIDENT Targets NGOs. Retrieved April 13, 2021.
  2. Lunghi, D. and Lu, K. (2021, April 9). Iron Tiger APT Updates Toolkit With Evolved SysUpdate Malware. Retrieved November 12, 2021.
  3. Lunghi, D. et al. (2020, February). Uncovering DRBControl. Retrieved November 12, 2021.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2023-03-26 19:54:58.293000+00:00 2024-04-11 00:21:49.455000+00:00
x_mitre_attack_spec_version 3.1.0 3.2.0
x_mitre_version 1.1 1.2

Description

SysUpdate is a backdoor written in C++ that has been used by Threat Group-3390 since at least 2020.[1]

References:

  1. Lunghi, D. and Lu, K. (2021, April 9). Iron Tiger APT Updates Toolkit With Evolved SysUpdate Malware. Retrieved November 12, 2021.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2023-03-20 16:32:21.733000+00:00 2024-04-10 23:44:19.752000+00:00
x_mitre_attack_spec_version 3.1.0 3.2.0
x_mitre_version 1.1 1.2

Description

ThreatNeedle is a backdoor that has been used by Lazarus Group since at least 2019 to target cryptocurrency, defense, and mobile gaming organizations. It is considered to be an advanced cluster of Lazarus Group's Manuscrypt (a.k.a. NukeSped) malware family.[1]

References:

  1. Vyacheslav Kopeytsev and Seongsu Park. (2021, February 25). Lazarus targets defense industry with ThreatNeedle. Retrieved October 27, 2021.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2023-03-26 20:18:23.760000+00:00 2024-04-10 22:32:30.915000+00:00
x_mitre_attack_spec_version 3.1.0 3.2.0
x_mitre_version 1.1 1.2

Description

Gelsemium is a modular malware comprised of a dropper (Gelsemine), a loader (Gelsenicine), and main (Gelsevirine) plug-ins written using the Microsoft Foundation Class (MFC) framework. Gelsemium has been used by the Gelsemium group since at least 2014.[1]

References:

  1. Dupuy, T. and Faou, M. (2021, June). Gelsemium. Retrieved November 30, 2021.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2023-03-26 19:02:24.792000+00:00 2024-04-11 02:28:01.735000+00:00
x_mitre_attack_spec_version 3.1.0 3.2.0
x_mitre_version 1.1 1.2

Description

Chrommme is a backdoor tool written using the Microsoft Foundation Class (MFC) framework that was first reported in June 2021; security researchers noted infrastructure overlaps with Gelsemium malware.[1]

References:

  1. Dupuy, T. and Faou, M. (2021, June). Gelsemium. Retrieved November 30, 2021.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2022-05-04 22:38:46.222000+00:00 2024-04-11 02:45:43.666000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 1.0 1.1

Description

Zox is a remote access tool that has been used by Axiom since at least 2008.[1]

References:

  1. Novetta. (n.d.). Operation SMN: Axiom Threat Actor Group Report. Retrieved November 12, 2014.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2023-03-20 22:03:44.670000+00:00 2024-04-10 20:30:02.520000+00:00
x_mitre_attack_spec_version 3.1.0 3.2.0
x_mitre_version 1.0 1.1

Description

DarkWatchman is a lightweight JavaScript-based remote access tool (RAT) that avoids file operations; it was first observed in November 2021.[1]

References:

  1. Smith, S., Stafford, M. (2021, December 14). DarkWatchman: A new evolution in fileless techniques. Retrieved January 10, 2022.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2023-03-22 03:34:53.944000+00:00 2024-04-11 02:40:18.361000+00:00
x_mitre_attack_spec_version 3.1.0 3.2.0
x_mitre_version 1.1 1.2

Description

Torisma is a second stage implant designed for specialized monitoring that has been used by Lazarus Group. Torisma was discovered during an investigation into the 2020 Operation North Star campaign that targeted the defense sector.[1]

References:

  1. Beek, C. (2020, November 5). Operation North Star: Behind The Scenes. Retrieved December 20, 2021.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2023-03-21 11:45:38.621000+00:00 2024-04-10 22:31:28.094000+00:00
x_mitre_attack_spec_version 3.1.0 3.2.0
x_mitre_version 1.1 1.2

Description

WhisperGate is a multi-stage wiper designed to look like ransomware that has been used against multiple government, non-profit, and information technology organizations in Ukraine since at least January 2022.[1][2][3]

References:

  1. Cybereason Nocturnus. (2022, February 15). Cybereason vs. WhisperGate and HermeticWiper. Retrieved March 10, 2022.
  2. Falcone, R. et al.. (2022, January 20). Threat Brief: Ongoing Russia and Ukraine Cyber Conflict. Retrieved March 10, 2022.
  3. MSTIC. (2022, January 15). Destructive malware targeting Ukrainian organizations. Retrieved March 10, 2022.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2023-04-05 20:48:07.280000+00:00 2024-04-10 22:13:49.349000+00:00
x_mitre_attack_spec_version 3.1.0 3.2.0
x_mitre_version 1.1 1.2

Description

CaddyWiper is a destructive data wiper that has been used in attacks against organizations in Ukraine since at least March 2022.[1][2]

References:

  1. ESET. (2022, March 15). CaddyWiper: New wiper malware discovered in Ukraine. Retrieved March 23, 2022.
  2. Malhotra, A. (2022, March 15). Threat Advisory: CaddyWiper. Retrieved March 23, 2022.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2022-04-11 20:38:33.997000+00:00 2024-04-17 15:09:37.646000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 1.0 1.1

Description

HermeticWiper is a data wiper that has been used since at least early 2022, primarily against Ukraine with additional activity observed in Latvia and Lithuania. Some sectors targeted include government, financial, defense, aviation, and IT services.[1][2][3][4][5]

References:

  1. Guerrero-Saade, J. (2022, February 23). HermeticWiper | New Destructive Malware Used In Cyber Attacks on Ukraine. Retrieved March 25, 2022.
  2. Symantec Threat Hunter Team. (2022, February 24). Ukraine: Disk-wiping Attacks Precede Russian Invasion. Retrieved March 25, 2022.
  3. Thomas, W. et al. (2022, February 25). CrowdStrike Falcon Protects from New Wiper Malware Used in Ukraine Cyberattacks. Retrieved March 25, 2022.
  4. ESET. (2022, February 24). HermeticWiper: New data wiping malware hits Ukraine. Retrieved March 25, 2022.
  5. Dani, M. (2022, March 1). Ukrainian Targets Hit by HermeticWiper, New Datawiper Malware. Retrieved March 25, 2022.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2022-10-18 23:19:38.268000+00:00 2024-04-11 02:22:04.078000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 1.0 1.1

Description

HermeticWizard is a worm that has been used to spread HermeticWiper in attacks against organizations in Ukraine since at least 2022.[1]

References:

  1. ESET. (2022, March 1). IsaacWiper and HermeticWizard: New wiper and worm targetingUkraine. Retrieved April 10, 2022.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2022-04-11 00:11:44.579000+00:00 2024-04-11 02:21:28.830000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 1.0 1.1

Description

ZxxZ is a trojan written in Visual C++ that has been used by BITTER since at least August 2021, including against Bangladeshi government personnel.[1]

References:

  1. Raghuprasad, C . (2022, May 11). Bitter APT adds Bangladesh to their targets. Retrieved June 1, 2022.
Details
Dictionary Item Added
FIELD OLD VALUE NEW VALUE
x_mitre_aliases ['ZxxZ']
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2022-06-02 12:27:58.811000+00:00 2024-04-10 20:29:50.729000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 1.0 1.1

Description

DanBot is a first-stage remote access Trojan written in C# that has been used by HEXANE since at least 2018.[1]

References:

  1. SecureWorks 2019, August 27 LYCEUM Takes Center Stage in Middle East Campaign Retrieved. 2019/11/19
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2022-09-01 14:11:46.207000+00:00 2024-04-11 02:42:34.540000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 1.0 1.1

Description

Milan is a backdoor implant based on DanBot that was written in Visual C++ and .NET. Milan has been used by HEXANE since at least June 2020.[1][2]

References:

  1. ClearSky Cyber Security . (2021, August). New Iranian Espionage Campaign By “Siamesekitten” - Lyceum. Retrieved June 6, 2022.
  2. Kayal, A. et al. (2021, October). LYCEUM REBORN: COUNTERINTELLIGENCE IN THE MIDDLE EAST. Retrieved June 14, 2022.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2022-08-31 21:45:17.174000+00:00 2024-04-11 00:43:16.261000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 1.0 1.1

Description

Shark is a backdoor malware written in C# and .NET that is an updated version of Milan; it has been used by HEXANE since at least July 2021.[1][2]

References:

  1. ClearSky Cyber Security . (2021, August). New Iranian Espionage Campaign By “Siamesekitten” - Lyceum. Retrieved June 6, 2022.
  2. Accenture. (2021, November 9). Who are latest targets of cyber group Lyceum?. Retrieved June 16, 2022.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2022-08-31 21:47:57.382000+00:00 2024-04-11 00:08:18.570000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 1.0 1.1

Description

Kevin is a backdoor implant written in C++ that has been used by HEXANE since at least June 2020, including in operations against organizations in Tunisia.[1]

References:

  1. Kayal, A. et al. (2021, October). LYCEUM REBORN: COUNTERINTELLIGENCE IN THE MIDDLE EAST. Retrieved June 14, 2022.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2022-08-31 16:38:11.028000+00:00 2024-04-17 22:07:06.736000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 1.0 1.1

Description

Heyoka Backdoor is a custom backdoor--based on the Heyoka open source exfiltration tool--that has been used by Aoqin Dragon since at least 2013.[1][2]

References:

  1. Chen, Joey. (2022, June 9). Aoqin Dragon | Newly-Discovered Chinese-linked APT Has Been Quietly Spying On Organizations For 10 Years. Retrieved July 14, 2022.
  2. Sourceforge. (n.d.). Heyoka POC Exfiltration Tool. Retrieved October 11, 2022.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2022-10-24 18:54:09.655000+00:00 2024-04-11 02:20:55.694000+00:00
x_mitre_attack_spec_version 3.0.0 3.2.0
x_mitre_version 1.0 1.1

Description

Squirrelwaffle is a loader that was first seen in September 2021. It has been used in spam email campaigns to deliver additional malware such as Cobalt Strike and the QakBot banking trojan.[1][2]

References:

  1. Kumar, A., Stone-Gross, Brett. (2021, September 28). Squirrelwaffle: New Loader Delivering Cobalt Strike. Retrieved August 9, 2022.
  2. Palazolo, G. (2021, October 7). SquirrelWaffle: New Malware Loader Delivering Cobalt Strike and QakBot. Retrieved August 9, 2022.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2022-08-26 21:08:39.890000+00:00 2024-04-11 00:02:15.805000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 1.0 1.1

Description

PyDCrypt is malware written in Python designed to deliver DCSrv. It has been used by Moses Staff since at least September 2021, with each sample tailored for its intended victim organization.[1]

References:

  1. Checkpoint Research. (2021, November 15). Uncovering MosesStaff techniques: Ideology over Money. Retrieved August 11, 2022.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2022-10-24 18:54:58.048000+00:00 2024-04-11 00:23:58.415000+00:00
x_mitre_attack_spec_version 3.0.0 3.2.0
x_mitre_version 1.0 1.1

Description

DCSrv is destructive malware that has been used by Moses Staff since at least September 2021. Though DCSrv has ransomware-like capabilities, Moses Staff does not demand ransom or offer a decryption key.[1]

References:

  1. Checkpoint Research. (2021, November 15). Uncovering MosesStaff techniques: Ideology over Money. Retrieved August 11, 2022.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2022-10-24 18:55:25.261000+00:00 2024-04-11 02:39:27.698000+00:00
x_mitre_attack_spec_version 3.0.0 3.2.0
x_mitre_version 1.0 1.1

Description

STARWHALE is Windows Script File (WSF) backdoor that has been used by MuddyWater, possibly since at least November 2021; there is also a STARWHALE variant written in Golang with similar capabilities. Security researchers have also noted the use of STARWHALE by UNC3313, which may be associated with MuddyWater.[1][2]

References:

  1. Tomcik, R. et al. (2022, February 24). Left On Read: Telegram Malware Spotted in Latest Iranian Cyber Espionage Activity. Retrieved August 18, 2022.
  2. FBI, CISA, CNMF, NCSC-UK. (2022, February 24). Iranian Government-Sponsored Actors Conduct Cyber Operations Against Global Government and Commercial Networks. Retrieved September 27, 2022.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2022-10-14 15:23:17.961000+00:00 2024-04-11 00:01:29.506000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 1.0 1.1

Description

Rclone is a command line program for syncing files with cloud storage services such as Dropbox, Google Drive, Amazon S3, and MEGA. Rclone has been used in a number of ransomware campaigns, including those associated with the Conti and DarkSide Ransomware-as-a-Service operations.[1][2][3][4][5]

References:

  1. Nick Craig-Wood. (n.d.). Rclone syncs your files to cloud storage. Retrieved August 30, 2022.
  2. Justin Schoenfeld and Aaron Didier. (2021, May 4). Rclone Wars: Transferring leverage in a ransomware attack. Retrieved August 30, 2022.
  3. Aaron Greetham. (2021, May 27). Detecting Rclone – An Effective Tool for Exfiltration. Retrieved August 30, 2022.
  4. Ramarcus Baylor. (2021, May 12). DarkSide Ransomware Gang: An Overview. Retrieved August 30, 2022.
  5. DFIR Report. (2021, November 29). CONTInuing the Bazar Ransomware Story. Retrieved September 29, 2022.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2023-04-13 13:14:41.257000+00:00 2024-04-04 03:50:32.975000+00:00
x_mitre_attack_spec_version 3.1.0 3.2.0
x_mitre_version 1.0 1.1

Description

Chinoxy is a backdoor that has been used since at least November 2018, during the FunnyDream campaign, to gain persistence and drop additional payloads. According to security researchers, Chinoxy has been used by Chinese-speaking threat actors.[1]

References:

  1. Vrabie, V. (2020, November). Dissecting a Chinese APT Targeting South Eastern Asian Government Institutions. Retrieved September 19, 2022.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2022-10-10 19:58:31.652000+00:00 2024-04-11 02:46:10.914000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 1.0 1.1

Description

FunnyDream is a backdoor with multiple components that was used during the FunnyDream campaign since at least 2019, primarily for execution and exfiltration.[1]

References:

  1. Vrabie, V. (2020, November). Dissecting a Chinese APT Targeting South Eastern Asian Government Institutions. Retrieved September 19, 2022.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2022-10-11 12:33:19.525000+00:00 2024-04-11 02:30:25.854000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 1.0 1.1

Description

PcShare is an open source remote access tool that has been modified and used by Chinese threat actors, most notably during the FunnyDream campaign since late 2018.[1][2]

References:

  1. Vrabie, V. (2020, November). Dissecting a Chinese APT Targeting South Eastern Asian Government Institutions. Retrieved September 19, 2022.
  2. LiveMirror. (2014, September 17). PcShare. Retrieved October 11, 2022.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2022-10-13 14:12:41.582000+00:00 2024-04-11 00:28:17.175000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 1.0 1.1

Description

KEYPLUG is a modular backdoor written in C++, with Windows and Linux variants, that has been used by APT41 since at least June 2021.[1]

References:

  1. Rufus Brown, Van Ta, Douglas Bienstock, Geoff Ackerman, John Wolfram. (2022, March 8). Does This Look Infected? A Summary of APT41 Targeting U.S. State Governments. Retrieved July 8, 2022.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2022-12-12 15:47:46.797000+00:00 2024-04-11 01:46:20.169000+00:00
x_mitre_attack_spec_version 3.1.0 3.2.0
x_mitre_version 1.0 1.1

Description

DEADEYE is a malware launcher that has been used by APT41 since at least May 2021. DEADEYE has variants that can either embed a payload inside a compiled binary (DEADEYE.EMBED) or append it to the end of a file (DEADEYE.APPEND).[1]

References:

  1. Rufus Brown, Van Ta, Douglas Bienstock, Geoff Ackerman, John Wolfram. (2022, March 8). Does This Look Infected? A Summary of APT41 Targeting U.S. State Governments. Retrieved July 8, 2022.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2023-04-07 19:30:56.058000+00:00 2024-04-11 02:38:56.409000+00:00
x_mitre_attack_spec_version 3.1.0 3.2.0
x_mitre_version 1.0 1.1

Description

metaMain is a backdoor used by Metador to maintain long-term access to compromised machines; it has also been used to decrypt Mafalda into memory.[1][2]

References:

  1. Ehrlich, A., et al. (2022, September). THE MYSTERY OF METADOR | AN UNATTRIBUTED THREAT HIDING IN TELCOS, ISPS, AND UNIVERSITIES. Retrieved January 23, 2023.
  2. SentinelLabs. (2022, September 22). Metador Technical Appendix. Retrieved April 4, 2023.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2023-04-05 14:09:42.670000+00:00 2024-04-11 00:45:31.029000+00:00
x_mitre_attack_spec_version 3.1.0 3.2.0
x_mitre_version 1.0 1.1

Description

Mafalda is a flexible interactive implant that has been used by Metador. Security researchers assess the Mafalda name may be inspired by an Argentinian cartoon character that has been popular as a means of political commentary since the 1960s. [1]

References:

  1. Ehrlich, A., et al. (2022, September). THE MYSTERY OF METADOR | AN UNATTRIBUTED THREAT HIDING IN TELCOS, ISPS, AND UNIVERSITIES. Retrieved January 23, 2023.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2023-04-04 21:05:06.549000+00:00 2024-04-11 00:49:47.226000+00:00
x_mitre_attack_spec_version 3.1.0 3.2.0
x_mitre_version 1.0 1.1

Description

Woody RAT is a remote access trojan (RAT) that has been used since at least August 2021 against Russian organizations.[1]

References:

  1. MalwareBytes Threat Intelligence Team. (2022, August 3). Woody RAT: A new feature-rich malware spotted in the wild. Retrieved December 6, 2022.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2023-04-17 14:58:02.400000+00:00 2024-04-10 20:34:14.166000+00:00
x_mitre_attack_spec_version 3.1.0 3.2.0
x_mitre_version 1.0 1.1

Description

BADHATCH is a backdoor that has been utilized by FIN8 since at least 2019. BADHATCH has been used to target the insurance, retail, technology, and chemical industries in the United States, Canada, South Africa, Panama, and Italy.[1][2]

References:

  1. Savelesky, K., et al. (2019, July 23). ABADBABE 8BADFOOD: Discovering BADHATCH and a Detailed Look at FIN8's Tooling. Retrieved September 8, 2021.
  2. Vrabie, V., et al. (2021, March 10). FIN8 Returns with Improved BADHATCH Toolkit. Retrieved September 8, 2021.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2023-10-04 16:53:23.530000+00:00 2024-04-11 02:55:51.310000+00:00
x_mitre_version 1.0 1.1