Version 14.1 15.0
Software : Enterprise ATT&CK Changelog
Added Software
| Description |
|---|
Cheerscrypt is a ransomware that was developed by Cinnamon Tempest and has been used in attacks against ESXi and Windows environments since at least 2022. Cheerscrypt was derived from the leaked Babuk source code and has infrastructure overlaps with deployments of Night Sky ransomware, which was also derived from Babuk.[1][2] References:
|
| Description |
|---|
HUI Loader is a custom DLL loader that has been used since at least 2015 by China-based threat groups including Cinnamon Tempest and menuPass to deploy malware on compromised hosts. HUI Loader has been observed in campaigns loading SodaMaster, PlugX, Cobalt Strike, Komplex, and several strains of ransomware.[1] References: |
| Description |
|---|
Ninja is a malware developed in C++ that has been used by ToddyCat to penetrate networks and control remote systems since at least 2020. Ninja is possibly part of a post exploitation toolkit exclusively used by ToddyCat and allows multiple operators to work simultaneously on the same machine. Ninja has been used against government and military entities in Europe and Asia and observed in specific infection chains being deployed by Samurai.[1] References: |
| Description |
|---|
SLOWPULSE is a malware that was used by APT5 as early as 2020 including against U.S. Defense Industrial Base (DIB) companies. SLOWPULSE has several variants and can modify legitimate Pulse Secure VPN files in order to log credentials and bypass single and two-factor authentication flows.[1] References: |
| Description |
|---|
COATHANGER is a remote access tool (RAT) targeting FortiGate networking appliances. First used in 2023 in targeted intrusions against military and government entities in the Netherlands along with other victims, COATHANGER was disclosed in early 2024, with a high confidence assessment linking this malware to a state-sponsored entity in the People's Republic of China. COATHANGER is delivered after gaining access to a FortiGate device, with in-the-wild observations linked to exploitation of CVE-2022-42475. The name COATHANGER is based on a unique string in the malware used to encrypt configuration files on disk: References: |
| Description |
|---|
NGLite is a backdoor Trojan that is only capable of running commands received through its C2 channel. While the capabilities are standard for a backdoor, NGLite uses a novel C2 channel that leverages a decentralized network based on the legitimate NKN to communicate between the backdoor and the actors.[1] References: |
| Description |
|---|
PULSECHECK is a web shell written in Perl that was used by APT5 as early as 2020 including against Pulse Secure VPNs at US Defense Industrial Base (DIB) companies.[1] References: |
| Description |
|---|
SLIGHTPULSE is a web shell that was used by APT5 as early as 2020 including against Pulse Secure VPNs at US Defense Industrial Base (DIB) entities.[1] References: |
| Description |
|---|
DarkGate first emerged in 2018 and has evolved into an initial access and data gathering tool associated with various criminal cyber operations. Written in Delphi and named "DarkGate" by its author, DarkGate is associated with credential theft, cryptomining, cryptotheft, and pre-ransomware actions.[1] DarkGate use increased significantly starting in 2022 and is under active development by its author, who provides it as a Malware-as-a-Service offering.[2] References:
|
| Description |
|---|
STEADYPULSE is a web shell that infects targeted Pulse Secure VPN servers through modification of a legitimate Perl script that was used as early as 2020 including in activity against US Defense Industrial Base (DIB) entities.[1] References: |
| Description |
|---|
RAPIDPULSE is a web shell that exists as a modification to a legitimate Pulse Secure file that has been used by APT5 since at least 2021.[1] References: |
| Description |
|---|
ZIPLINE is a passive backdoor that was used during Cutting Edge on compromised Secure Connect VPNs for reverse shell and proxy functionality.[1] References: |
| Description |
|---|
WIREFIRE is a web shell written in Python that exists as trojanized logic to the visits.py component of Ivanti Connect Secure VPN appliances. WIREFIRE was used during Cutting Edge for downloading files and command execution.[1] References: |
| Description |
|---|
WARPWIRE is a Javascript credential stealer that targets plaintext passwords and usernames for exfiltration that was used during Cutting Edge to target Ivanti Connect Secure VPNs.[1][2] References:
|
| Description |
|---|
GLASSTOKEN is a custom web shell used by threat actors during Cutting Edge to execute commands on compromised Ivanti Secure Connect VPNs.[1] References: |
| Description |
|---|
BUSHWALK is a web shell written in Perl that was inserted into the legitimate querymanifest.cgi file on compromised Ivanti Connect Secure VPNs during Cutting Edge.[1][2] References:
|
| Description |
|---|
LIGHTWIRE is a web shell written in Perl that was used during Cutting Edge to maintain access and enable command execution by imbedding into the legitimate compcheckresult.cgi component of Ivanti Secure Connect VPNs.[1][2] References:
|
| Description |
|---|
FRAMESTING is a Python web shell that was used during Cutting Edge to embed into an Ivanti Connect Secure Python package for command execution.[1] References: |
| Description |
|---|
LITTLELAMB.WOOLTEA is a backdoor that was used by UNC5325 during Cutting Edge to deploy malware on targeted Ivanti Connect Secure VPNs and to establish persistence across system upgrades and patches.[1] References: |
| Description |
|---|
Mispadu is a banking trojan written in Delphi that was first observed in 2019 and uses a Malware-as-a-Service (MaaS) business model.[1][2] This malware is operated, managed, and sold by the Malteiro cybercriminal group.[2] Mispadu has mainly been used to target victims in Brazil and Mexico, and has also had confirmed operations throughout Latin America and Europe.[2][3][4] References:
|
| Description |
|---|
PITSTOP is a backdoor that was deployed on compromised Ivanti Connect Secure VPNs during Cutting Edge to enable command execution and file read/write.[1] References: |
| Description |
|---|
SocGholish is a JavaScript-based loader malware that has been used since at least 2017. It has been observed in use against multiple sectors globally for initial access, primarily through drive-by-downloads masquerading as software updates. SocGholish is operated by Mustard Tempest and its access has been sold to groups including Indrik Spider for downloading secondary RAT and ransomware payloads.[1][2][3][4] References:
|
| Description |
|---|
AcidRain is an ELF binary targeting modems and routers using MIPS architecture.[1] AcidRain is associated with the ViaSat KA-SAT communication outage that took place during the initial phases of the 2022 full-scale invasion of Ukraine. Analysis indicates overlap with another network device-targeting malware, VPNFilter, associated with Sandworm Team.[1] US and European government sources linked AcidRain to Russian government entities, while Ukrainian government sources linked AcidRain specifically to Sandworm Team.[2][3] References:
|
Modified Software
| Description |
|---|
Mimikatz is a credential dumper capable of obtaining plaintext Windows account logins and passwords, along with many other features that make it useful for testing the security of networks. [1] [2] References: |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2023-07-27 15:33:07.594000+00:00 | 2024-02-09 21:31:30.227000+00:00 |
| x_mitre_attack_spec_version | 3.1.0 | 3.2.0 |
| x_mitre_version | 1.8 | 1.9 |
| Description |
|---|
Skeleton Key is malware used to inject false credentials into domain controllers with the intent of creating a backdoor password. [1] Functionality similar to Skeleton Key is included as a module in Mimikatz. References: |
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2020-03-18 16:17:41.437000+00:00 | 2024-02-06 19:02:00.781000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 1.1 | 1.2 |
| Description |
|---|
Taidoor is a remote access trojan (RAT) that has been used by Chinese government cyber actors to maintain access on victim networks.[1] Taidoor has primarily been used against Taiwanese government organizations since at least 2010.[2] References: |
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2021-10-15 12:34:22.853000+00:00 | 2024-04-10 22:36:03.362000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 2.0 | 2.1 |
| Description |
|---|
PoisonIvy is a popular remote access tool (RAT) that has been used by many groups.[1][2][3] References: |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2023-03-20 22:03:44.669000+00:00 | 2024-02-14 19:16:01.583000+00:00 |
| x_mitre_attack_spec_version | 3.1.0 | 3.2.0 |
| x_mitre_version | 2.1 | 2.2 |
| Description |
|---|
BISCUIT is a backdoor that has been used by APT1 since as early as 2007. [1] References: |
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2020-03-30 14:57:52.169000+00:00 | 2023-12-26 19:55:54.853000+00:00 |
| external_references[3]['url'] | https://www.fireeye.com/content/dam/fireeye-www/services/pdfs/mandiant-apt1-report-appendix.zip | https://www.mandiant.com/sites/default/files/2021-09/mandiant-apt1-report.pdf |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 1.2 | 1.3 |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2023-04-10 21:53:43.748000+00:00 | 2024-01-03 21:37:14.516000+00:00 |
| x_mitre_attack_spec_version | 3.1.0 | 3.2.0 |
| x_mitre_version | 2.4 | 2.5 |
| Description |
|---|
Uroburos is a sophisticated cyber espionage tool written in C that has been used by units within Russia's Federal Security Service (FSB) associated with the Turla toolset to collect intelligence on sensitive targets worldwide. Uroburos has several variants and has undergone nearly constant upgrade since its initial development in 2003 to keep it viable after public disclosures. Uroburos is typically deployed to external-facing nodes on a targeted network and has the ability to leverage additional tools and TTPs to further exploit an internal network. Uroburos has interoperable implants for Windows, Linux, and macOS, employs a high level of stealth in communications and architecture, and can easily incorporate new or replacement components.[1][2] References: |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2023-10-02 17:26:25.052000+00:00 | 2024-04-10 22:18:48.304000+00:00 |
| x_mitre_version | 2.0 | 2.1 |
| Description |
|---|
PsExec is a free Microsoft tool that can be used to execute a program on another computer. It is used by IT administrators and attackers.[1][2] References: |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2023-08-09 18:07:11.859000+00:00 | 2024-04-04 03:50:11+00:00 |
| x_mitre_attack_spec_version | 3.1.0 | 3.2.0 |
| x_mitre_version | 1.5 | 1.6 |
| Description |
|---|
gh0st RAT is a remote access tool (RAT). The source code is public and it has been used by multiple groups.[1][2][3] References:
|
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2023-03-20 22:03:44.666000+00:00 | 2024-02-06 19:00:45.557000+00:00 |
| x_mitre_attack_spec_version | 3.1.0 | 3.2.0 |
| x_mitre_version | 3.1 | 3.2 |
| Description |
|---|
The Net utility is a component of the Windows operating system. It is used in command-line operations for control of users, groups, services, and network connections. [1] Net has a great deal of functionality, [2] much of which is useful for an adversary, such as gathering system and network information for Discovery, moving laterally through SMB/Windows Admin Shares using References: |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2023-07-25 19:25:59.767000+00:00 | 2024-02-01 04:34:30.855000+00:00 |
| external_references[2]['url'] | http://windowsitpro.com/windows/netexe-reference | https://web.archive.org/web/20150511162820/http://windowsitpro.com/windows/netexe-reference |
| x_mitre_attack_spec_version | 3.1.0 | 3.2.0 |
| x_mitre_version | 2.5 | 2.6 |
| Description |
|---|
JHUHUGIT is malware used by APT28. It is based on Carberp source code and serves as reconnaissance malware. [1] [2] [3] [4] References:
|
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2020-03-30 16:51:56.323000+00:00 | 2024-04-11 01:49:50.568000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 2.1 | 2.2 |
| Description |
|---|
CozyCar is malware that was used by APT29 from 2010 to 2015. It is a modular malware platform, and its backdoor component can be instructed to download and execute a variety of modules with different functionality. [1] References: |
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2020-03-28 21:32:59.528000+00:00 | 2024-04-11 02:44:33.881000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 1.2 | 1.3 |
| Description |
|---|
The Tasklist utility displays a list of applications and services with their Process IDs (PID) for all tasks running on either a local or a remote computer. It is packaged with Windows operating systems and can be executed from the command-line interface. [1] References: |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2022-10-12 21:30:23.536000+00:00 | 2024-02-12 19:14:37.984000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 1.1 | 1.2 |
| Description |
|---|
Sakula is a remote access tool (RAT) that first surfaced in 2012 and was used in intrusions throughout 2015. [1] References: |
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2020-03-30 18:13:29.169000+00:00 | 2024-04-11 00:10:10.398000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 1.1 | 1.2 |
| Description |
|---|
Elise is a custom backdoor Trojan that appears to be used exclusively by Lotus Blossom. It is part of a larger group of tools referred to as LStudio, ST Group, and APT0LSTU. [1][2] References: |
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2020-03-20 23:20:16.933000+00:00 | 2024-04-11 02:35:48.740000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 1.2 | 1.3 |
| Description |
|---|
Emissary is a Trojan that has been used by Lotus Blossom. It shares code with Elise, with both Trojans being part of a malware group referred to as LStudio. [1] References: |
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2021-08-09 14:21:48.477000+00:00 | 2024-04-11 02:35:14.040000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 1.2 | 1.3 |
| Description |
|---|
Hi-Zor is a remote access tool (RAT) that has characteristics similar to Sakula. It was used in a campaign named INOCNATION. [1] References: |
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2021-02-09 14:57:16.085000+00:00 | 2024-04-11 02:20:26.551000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 1.1 | 1.2 |
| Description |
|---|
netstat is an operating system utility that displays active TCP connections, listening ports, and network statistics. [1] References: |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2023-07-25 19:25:05.678000+00:00 | 2024-01-23 19:57:39.135000+00:00 |
| x_mitre_attack_spec_version | 3.1.0 | 3.2.0 |
| x_mitre_version | 1.2 | 1.3 |
| Description |
|---|
WEBC2 is a family of backdoor malware used by APT1 as early as July 2006. WEBC2 backdoors are designed to retrieve a webpage, with commands hidden in HTML comments or special tags, from a predetermined C2 server. [1][2] References: |
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2020-08-25 21:23:24.223000+00:00 | 2023-12-26 19:55:54.848000+00:00 |
| external_references[2]['url'] | https://www.fireeye.com/content/dam/fireeye-www/services/pdfs/mandiant-apt1-report-appendix.zip | https://www.mandiant.com/sites/default/files/2021-09/mandiant-apt1-report.pdf |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| Description |
|---|
Prikormka is a malware family used in a campaign known as Operation Groundbait. It has predominantly been observed in Ukraine and was used as early as 2008. [1] References: |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2022-04-19 01:42:59.312000+00:00 | 2024-04-11 00:25:44.638000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 1.3 | 1.4 |
| Description |
|---|
Remsec is a modular backdoor that has been used by Strider and appears to have been designed primarily for espionage purposes. Many of its modules are written in Lua. [1] References: |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2023-03-28 20:28:28.088000+00:00 | 2024-04-11 00:16:18.864000+00:00 |
| x_mitre_attack_spec_version | 3.1.0 | 3.2.0 |
| x_mitre_version | 1.2 | 1.3 |
| Description |
|---|
TINYTYPHON is a backdoor that has been used by the actors responsible for the MONSOON campaign. The majority of its code was reportedly taken from the MyDoom worm. [1] References: |
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_aliases | ['TINYTYPHON'] | |
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2018-10-17 00:14:20.652000+00:00 | 2024-04-10 22:32:05.321000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 1.0 | 1.1 |
| Description |
|---|
USBStealer is malware that has been used by APT28 since at least 2005 to extract information from air-gapped networks. It does not have the capability to communicate over the Internet and has been used in conjunction with ADVSTORESHELL. [1] [2] References: |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2022-04-19 22:53:27.639000+00:00 | 2024-04-10 22:17:40.838000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 1.2 | 1.3 |
| Modified Description View changes side-by-side |
|---|
| [Shamoon](https://attack.mitre.org/software/S0140) is wiper malware that was first used by an Iranian group known as the "Cutting Sword of Justice" in 2012. Other versions known as Shamoon 2 and Shamoon 3 were observed in 2016 and 2018. [Shamoon](https://attack.mitre.org/software/S0140) has also been seen leveraging [RawDisk](https://attack.mitre.org/software/S0364) and Filerase to carry out data wiping tasks. Analysis has linked [Shamoon](https://attack.mitre.org/software/S0140) with [Kwampirs](https://attack.mitre.org/software/S0236) based on multiple shared artifacts and coding patterns.(Citation: Cylera Kwampirs 2022) The term Shamoon is sometimes used to refer to the group using the malware as well as the malware itself.(Citation: Palo Alto Shamoon Nov 2016)(Citation: Unit 42 Shamoon3 2018)(Citation: Symantec Shamoon 2012)(Citation: FireEye Shamoon Nov 2016) |
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2021-02-09 13:42:15.121000+00:00 | 2024-02-08 20:53:17.332000+00:00 |
| description | [Shamoon](https://attack.mitre.org/software/S0140) is wiper malware that was first used by an Iranian group known as the "Cutting Sword of Justice" in 2012. Other versions known as Shamoon 2 and Shamoon 3 were observed in 2016 and 2018. [Shamoon](https://attack.mitre.org/software/S0140) has also been seen leveraging [RawDisk](https://attack.mitre.org/software/S0364) and Filerase to carry out data wiping tasks. The term Shamoon is sometimes used to refer to the group using the malware as well as the malware itself.(Citation: Palo Alto Shamoon Nov 2016)(Citation: Unit 42 Shamoon3 2018)(Citation: Symantec Shamoon 2012)(Citation: FireEye Shamoon Nov 2016) | [Shamoon](https://attack.mitre.org/software/S0140) is wiper malware that was first used by an Iranian group known as the "Cutting Sword of Justice" in 2012. Other versions known as Shamoon 2 and Shamoon 3 were observed in 2016 and 2018. [Shamoon](https://attack.mitre.org/software/S0140) has also been seen leveraging [RawDisk](https://attack.mitre.org/software/S0364) and Filerase to carry out data wiping tasks. Analysis has linked [Shamoon](https://attack.mitre.org/software/S0140) with [Kwampirs](https://attack.mitre.org/software/S0236) based on multiple shared artifacts and coding patterns.(Citation: Cylera Kwampirs 2022) The term Shamoon is sometimes used to refer to the group using the malware as well as the malware itself.(Citation: Palo Alto Shamoon Nov 2016)(Citation: Unit 42 Shamoon3 2018)(Citation: Symantec Shamoon 2012)(Citation: FireEye Shamoon Nov 2016) |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 2.1 | 2.2 |
Iterable Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| external_references | {'source_name': 'Cylera Kwampirs 2022', 'description': 'Pablo Rincón Crespo. (2022, January). The link between Kwampirs (Orangeworm) and Shamoon APTs. Retrieved February 8, 2024.', 'url': 'https://resources.cylera.com/hubfs/Cylera%20Labs/Cylera%20Labs%20Kwampirs%20Shamoon%20Technical%20Report.pdf'} |
| Description |
|---|
Winnti for Windows is a modular remote access Trojan (RAT) that has been used likely by multiple groups to carry out intrusions in various regions since at least 2010, including by one group referred to as the same name, Winnti Group.[1][2][3][4]. The Linux variant is tracked separately under Winnti for Linux.[5] References:
|
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2023-03-20 22:02:53.982000+00:00 | 2024-04-10 20:35:29.262000+00:00 |
| x_mitre_attack_spec_version | 3.1.0 | 3.2.0 |
| x_mitre_version | 3.0 | 3.1 |
| Description |
|---|
RedLeaves is a malware family used by menuPass. The code overlaps with PlugX and may be based upon the open source tool Trochilus. [1] [2] References: |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2023-03-23 15:14:18.594000+00:00 | 2024-04-11 00:17:52.256000+00:00 |
| x_mitre_attack_spec_version | 3.1.0 | 3.2.0 |
| x_mitre_version | 1.1 | 1.2 |
| Description |
|---|
Cobalt Strike is a commercial, full-featured, remote access tool that bills itself as “adversary simulation software designed to execute targeted attacks and emulate the post-exploitation actions of advanced threat actors”. Cobalt Strike’s interactive post-exploit capabilities cover the full range of ATT&CK tactics, all executed within a single, integrated system.[1] In addition to its own capabilities, Cobalt Strike leverages the capabilities of other well-known tools such as Metasploit and Mimikatz.[1] References: |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2023-08-09 16:47:36.538000+00:00 | 2024-04-17 22:05:58.343000+00:00 |
| x_mitre_attack_spec_version | 3.1.0 | 3.2.0 |
| x_mitre_version | 1.11 | 1.12 |
| Description |
|---|
Gazer is a backdoor used by Turla since at least 2016. [1] References: |
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2020-12-04 21:07:22.870000+00:00 | 2024-04-11 02:28:51.206000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 1.2 | 1.3 |
| Description |
|---|
Helminth is a backdoor that has at least two variants - one written in VBScript and PowerShell that is delivered via a macros in Excel spreadsheets, and one that is a standalone Windows executable. [1] References: |
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2020-03-28 21:35:13.610000+00:00 | 2024-04-11 02:22:38.177000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 1.1 | 1.2 |
| Description |
|---|
Reaver is a malware family that has been in the wild since at least late 2016. Reporting indicates victims have primarily been associated with the "Five Poisons," which are movements the Chinese government considers dangerous. The type of malware is rare due to its final payload being in the form of Control Panel items.[1] References: |
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2021-02-09 15:02:42.727000+00:00 | 2024-04-11 00:21:09.543000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 1.1 | 1.2 |
| Description |
|---|
Volgmer is a backdoor Trojan designed to provide covert access to a compromised system. It has been used since at least 2013 to target the government, financial, automotive, and media industries. Its primary delivery mechanism is suspected to be spearphishing. [1] References: |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2023-03-26 20:40:35.183000+00:00 | 2024-04-10 22:16:05.440000+00:00 |
| x_mitre_attack_spec_version | 3.1.0 | 3.2.0 |
| x_mitre_version | 1.2 | 1.3 |
| Description |
|---|
DOGCALL is a backdoor used by APT37 that has been used to target South Korean government and military organizations in 2017. It is typically dropped using a Hangul Word Processor (HWP) exploit. [1] References: |
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2020-03-30 15:27:25.149000+00:00 | 2024-04-11 02:37:34.915000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 1.2 | 1.3 |
| Description |
|---|
Smoke Loader is a malicious bot application that can be used to load other malware. Smoke Loader has been seen in the wild since at least 2011 and has included a number of different payloads. It is notorious for its use of deception and self-protection. It also comes with several plug-ins. [1] [2] References: |
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2020-03-28 21:43:37.366000+00:00 | 2024-04-11 00:04:55.094000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 1.2 | 1.3 |
| Description |
|---|
NanHaiShu is a remote access tool and JScript backdoor used by Leviathan. NanHaiShu has been used to target government and private-sector organizations that have relations to the South China Sea dispute. [1] [2] References: |
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2020-06-23 20:05:03.169000+00:00 | 2024-04-11 00:37:11.186000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 1.1 | 1.2 |
| Description |
|---|
ZeroT is a Trojan used by TA459, often in conjunction with PlugX. [1] [2] References: |
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2020-03-30 18:31:33.197000+00:00 | 2024-04-10 20:32:14.510000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 1.1 | 1.2 |
| Description |
|---|
HOMEFRY is a 64-bit Windows password dumper/cracker that has previously been used in conjunction with other Leviathan backdoors. [1] References: |
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2020-03-30 16:47:38.393000+00:00 | 2024-04-11 02:18:12.743000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 1.1 | 1.2 |
| Modified Description View changes side-by-side |
|---|
| [Kwampirs](https://attack.mitre.org/software/S0236) is a backdoor Trojan used by [Orangeworm](https://attack.mitre.org/groups/G0071). It [Kwampirs](https://attack.mitre.org/software/S0236) has been found on machines which had software installed for the use and control of high-tech imaging devices such as X-Ray and MRI machines. (Citation: machines.(Citation: Symantec Orangeworm April 2018) [Kwampirs](https://attack.mitre.org/software/S0236) has multiple technical overlaps with [Shamoon](https://attack.mitre.org/software/S0140) based on reverse engineering analysis.(Citation: Cylera Kwampirs 2022) |
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2020-03-18 22:06:42.386000+00:00 | 2024-04-11 01:44:05.770000+00:00 |
| description | [Kwampirs](https://attack.mitre.org/software/S0236) is a backdoor Trojan used by [Orangeworm](https://attack.mitre.org/groups/G0071). It has been found on machines which had software installed for the use and control of high-tech imaging devices such as X-Ray and MRI machines. (Citation: Symantec Orangeworm April 2018) | [Kwampirs](https://attack.mitre.org/software/S0236) is a backdoor Trojan used by [Orangeworm](https://attack.mitre.org/groups/G0071). [Kwampirs](https://attack.mitre.org/software/S0236) has been found on machines which had software installed for the use and control of high-tech imaging devices such as X-Ray and MRI machines.(Citation: Symantec Orangeworm April 2018) [Kwampirs](https://attack.mitre.org/software/S0236) has multiple technical overlaps with [Shamoon](https://attack.mitre.org/software/S0140) based on reverse engineering analysis.(Citation: Cylera Kwampirs 2022) |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 1.1 | 1.2 |
Iterable Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| external_references | {'source_name': 'Cylera Kwampirs 2022', 'description': 'Pablo Rincón Crespo. (2022, January). The link between Kwampirs (Orangeworm) and Shamoon APTs. Retrieved February 8, 2024.', 'url': 'https://resources.cylera.com/hubfs/Cylera%20Labs/Cylera%20Labs%20Kwampirs%20Shamoon%20Technical%20Report.pdf'} |
| Description |
|---|
GravityRAT is a remote access tool (RAT) and has been in ongoing development since 2016. The actor behind the tool remains unknown, but two usernames have been recovered that link to the author, which are "TheMartian" and "The Invincible." According to the National Computer Emergency Response Team (CERT) of India, the malware has been identified in attacks against organization and entities in India. [1] References: |
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2020-03-30 20:44:34.524000+00:00 | 2024-04-11 02:25:20.119000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 1.2 | 1.3 |
| Description |
|---|
Mosquito is a Win32 backdoor that has been used by Turla. Mosquito is made up of three parts: the installer, the launcher, and the backdoor. The main backdoor is called CommanderDLL and is launched by the loader program. [1] References: |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2023-03-26 19:19:33.603000+00:00 | 2024-04-11 00:38:26.326000+00:00 |
| x_mitre_attack_spec_version | 3.1.0 | 3.2.0 |
| x_mitre_version | 1.2 | 1.3 |
| Description |
|---|
VERMIN is a remote access tool written in the Microsoft .NET framework. It is mostly composed of original code, but also has some open source code. [1] References: |
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2020-03-30 18:26:04.840000+00:00 | 2024-04-10 22:17:02.480000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 1.1 | 1.2 |
| Description |
|---|
TYPEFRAME is a remote access tool that has been used by Lazarus Group. [1] References: |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2023-03-26 20:22:31.288000+00:00 | 2024-04-10 22:26:03.638000+00:00 |
| x_mitre_attack_spec_version | 3.1.0 | 3.2.0 |
| x_mitre_version | 1.2 | 1.3 |
| Description |
|---|
TrickBot is a Trojan spyware program written in C++ that first emerged in September 2016 as a possible successor to Dyre. TrickBot was developed and initially used by Wizard Spider for targeting banking sites in North America, Australia, and throughout Europe; it has since been used against all sectors worldwide as part of "big game hunting" ransomware campaigns.[1][2][3][4] References:
|
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2023-08-09 16:44:56.511000+00:00 | 2024-04-10 22:28:21.746000+00:00 |
| x_mitre_attack_spec_version | 3.1.0 | 3.2.0 |
| x_mitre_version | 2.1 | 2.2 |
| Description |
|---|
FELIXROOT is a backdoor that has been used to target Ukrainian victims. [1] References: |
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2020-03-30 16:23:47.799000+00:00 | 2024-04-11 02:33:38.488000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 2.1 | 2.2 |
| Description |
|---|
Bisonal is a remote access tool (RAT) that has been used by Tonto Team against public and private sector organizations in Russia, South Korea, and Japan since at least December 2010.[1][2] References: |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2022-04-18 17:18:36.512000+00:00 | 2024-04-11 02:53:35.918000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 2.0 | 2.1 |
| Description |
|---|
This piece of malware steals the content of the user's keychain while maintaining a permanent backdoor [1]. References: |
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2021-10-17 14:35:31.022000+00:00 | 2024-01-10 15:18:40.400000+00:00 |
| external_references[4]['url'] | https://www.synack.com/2017/01/01/mac-malware-2016/ | https://objective-see.org/blog/blog_0x16.html |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| Description |
|---|
Moreeggs is a JScript backdoor used by Cobalt Group and FIN6. Its name was given based on the variable "Moreeggs" being present in its code. There are at least two different versions of the backdoor being used, version 2.0 and version 4.4. [1][2] References: |
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2021-04-23 19:15:17.339000+00:00 | 2024-04-11 00:40:07.038000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 3.0 | 3.1 |
| Description |
|---|
Zeus Panda is a Trojan designed to steal banking information and other sensitive credentials for exfiltration. Zeus Panda’s original source code was leaked in 2011, allowing threat actors to use its source code as a basis for new malware variants. It is mainly used to target Windows operating systems ranging from Windows XP through Windows 10.[1][2] References: |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2023-03-22 05:47:42.436000+00:00 | 2024-04-10 20:31:00.234000+00:00 |
| x_mitre_attack_spec_version | 3.1.0 | 3.2.0 |
| x_mitre_version | 1.3 | 1.4 |
| Description |
|---|
UBoatRAT is a remote access tool that was identified in May 2017.[1] References: |
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2020-03-30 18:24:01.572000+00:00 | 2024-04-10 22:22:03.759000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 1.1 | 1.2 |
| Description |
|---|
Micropsia is a remote access tool written in Delphi.[1][2] References: |
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2020-03-30 17:03:01.353000+00:00 | 2024-04-11 00:43:46.245000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 1.1 | 1.2 |
| Description |
|---|
GreyEnergy is a backdoor written in C and compiled in Visual Studio. GreyEnergy shares similarities with the BlackEnergy malware and is thought to be the successor of it.[1] References: |
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2020-03-30 16:44:35.685000+00:00 | 2024-04-11 02:24:46.255000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 1.1 | 1.2 |
| Description |
|---|
Seasalt is malware that has been linked to APT1's 2010 operations. It shares some code similarities with OceanSalt.[1][2] References: |
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2020-03-19 19:18:10.963000+00:00 | 2024-04-11 00:08:51.818000+00:00 |
| external_references[2]['url'] | https://www.fireeye.com/content/dam/fireeye-www/services/pdfs/mandiant-apt1-report-appendix.zip | https://www.mandiant.com/sites/default/files/2021-09/mandiant-apt1-report.pdf |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 1.1 | 1.2 |
| Description |
|---|
AuditCred is a malicious DLL that has been used by Lazarus Group during their 2018 attacks.[1] References: |
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2020-03-30 14:51:50.371000+00:00 | 2024-04-11 02:57:01.302000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 1.1 | 1.2 |
| Description |
|---|
Cardinal RAT is a potentially low volume remote access trojan (RAT) observed since December 2015. Cardinal RAT is notable for its unique utilization of uncompiled C# source code and the Microsoft Windows built-in csc.exe compiler.[1] References: |
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2020-03-30 01:59:34.624000+00:00 | 2024-04-11 02:47:11.431000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 1.1 | 1.2 |
| Description |
|---|
LaZagne is a post-exploitation, open-source tool used to recover stored passwords on a system. It has modules for Windows, Linux, and OSX, but is mainly focused on Windows systems. LaZagne is publicly available on GitHub.[1] References: |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2023-08-03 18:35:09.021000+00:00 | 2024-04-04 03:49:27.035000+00:00 |
| x_mitre_attack_spec_version | 3.1.0 | 3.2.0 |
| x_mitre_version | 1.5 | 1.6 |
Iterable Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| external_references | {'source_name': 'GitHub LaZange Dec 2018', 'description': 'Zanni, A. (n.d.). The LaZagne Project !!!. Retrieved December 14, 2018.', 'url': 'https://github.com/AlessandroZ/LaZagne'} |
| Description |
|---|
OSXOCEANLOTUS.D is a macOS backdoor used by APT32. First discovered in 2015, APT32 has continued to make improvements using a plugin architecture to extend capabilities, specifically using References:
|
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2023-10-12 20:21:08.235000+00:00 | 2024-04-11 00:28:52.310000+00:00 |
| x_mitre_version | 3.0 | 3.1 |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2022-04-13 17:26:25.143000+00:00 | 2024-04-11 01:44:46.026000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 2.0 | 2.1 |
| Description |
|---|
Impacket is an open source collection of modules written in Python for programmatically constructing and manipulating network protocols. Impacket contains several tools for remote service execution, Kerberos manipulation, Windows credential dumping, packet sniffing, and relay attacks.[1] References: |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2023-07-27 15:31:10.648000+00:00 | 2024-03-14 17:27:34.759000+00:00 |
| x_mitre_attack_spec_version | 3.1.0 | 3.2.0 |
| x_mitre_version | 1.5 | 1.6 |
| Description |
|---|
SamSam is ransomware that appeared in early 2016. Unlike some ransomware, its variants have required operators to manually interact with the malware to execute some of its core components.[1][2][3][4] References:
|
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2019-04-18 20:59:56.853000+00:00 | 2024-04-11 00:09:42.414000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 1.0 | 1.1 |
| Description |
|---|
Astaroth is a Trojan and information stealer known to affect companies in Europe, Brazil, and throughout Latin America. It has been known publicly since at least late 2017. [1][2][3] References:
|
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2023-11-06 20:12:28.502000+00:00 | 2024-04-11 02:58:17.763000+00:00 |
| x_mitre_version | 2.2 | 2.3 |
| Description |
|---|
SpeakUp is a Trojan backdoor that targets both Linux and OSX devices. It was first observed in January 2019. [1] References: |
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2020-03-29 16:41:33.128000+00:00 | 2024-04-11 00:02:59.341000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 1.1 | 1.2 |
| Description |
|---|
Remexi is a Windows-based Trojan that was developed in the C programming language.[1] References: |
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2020-03-30 18:04:25.880000+00:00 | 2024-04-11 00:17:12.008000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 1.1 | 1.2 |
| Description |
|---|
HOPLIGHT is a backdoor Trojan that has reportedly been used by the North Korean government.[1] References: |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2023-03-28 20:24:33.471000+00:00 | 2024-02-09 19:24:50.164000+00:00 |
| x_mitre_attack_spec_version | 3.1.0 | 3.2.0 |
| x_mitre_version | 1.2 | 1.3 |
| Description |
|---|
StoneDrill is wiper malware discovered in destructive campaigns against both Middle Eastern and European targets in association with APT33.[1][2] References:
|
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2020-03-30 18:15:28.897000+00:00 | 2024-04-11 00:00:54.356000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 1.1 | 1.2 |
| Description |
|---|
FlawedGrace is a fully featured remote access tool (RAT) written in C++ that was first observed in late 2017.[1] References: |
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2019-06-07 18:47:42.365000+00:00 | 2024-04-11 02:32:31.883000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 1.0 | 1.1 |
| Description |
|---|
njRAT is a remote access tool (RAT) that was first observed in 2012. It has been used by threat actors in the Middle East.[1] References: |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2023-09-20 20:03:22.206000+00:00 | 2024-04-11 00:33:37.539000+00:00 |
| x_mitre_attack_spec_version | 3.1.0 | 3.2.0 |
| x_mitre_version | 1.5 | 1.6 |
| Description |
|---|
Ursnif is a banking trojan and variant of the Gozi malware observed being spread through various automated exploit kits, Spearphishing Attachments, and malicious links.[1][2] Ursnif is associated primarily with data theft, but variants also include components (backdoors, spyware, file injectors, etc.) capable of a wide variety of behaviors.[3] References: |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2023-03-22 05:42:32.541000+00:00 | 2024-04-10 22:18:21.527000+00:00 |
| external_references[5]['url'] | https://blog.trendmicro.com/trendlabs-security-intelligence/ursnif-the-multifaceted-malware/?_ga=2.165628854.808042651.1508120821-744063452.1505819992 | https://web.archive.org/web/20210719165945/https://www.trendmicro.com/en_us/research/15/c/ursnif-the-multifaceted-malware.html?_ga=2.165628854.808042651.1508120821-744063452.1505819992 |
| x_mitre_attack_spec_version | 3.1.0 | 3.2.0 |
| x_mitre_version | 1.4 | 1.5 |
| Description |
|---|
KeyBoy is malware that has been used in targeted campaigns against members of the Tibetan Parliament in 2016.[1][2] References: |
Details
Dictionary Item Removed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_contributors | ['Bart Parys'] |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2023-03-23 15:22:36.377000+00:00 | 2024-04-18 18:25:18.520000+00:00 |
| x_mitre_attack_spec_version | 3.1.0 | 3.2.0 |
| x_mitre_version | 1.2 | 1.3 |
| Description |
|---|
YAHOYAH is a Trojan used by Tropic Trooper as a second-stage backdoor.[1] References: |
Details
Dictionary Item Removed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_contributors | ['Bart Parys'] |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2023-03-23 15:24:22.256000+00:00 | 2024-04-19 13:19:32.736000+00:00 |
| x_mitre_attack_spec_version | 3.1.0 | 3.2.0 |
| x_mitre_version | 1.1 | 1.2 |
| Description |
|---|
HAWKBALL is a backdoor that was observed in targeting of the government sector in Central Asia.[1] References: |
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2020-03-30 16:46:39.617000+00:00 | 2024-04-11 02:23:13.352000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 1.1 | 1.2 |
| Description |
|---|
HiddenWasp is a Linux-based Trojan used to target systems for remote control. It comes in the form of a statically linked ELF binary with stdlibc++.[1] References: |
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2021-04-23 20:07:01.487000+00:00 | 2024-04-11 02:19:50.306000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 1.2 | 1.3 |
| Description |
|---|
LightNeuron is a sophisticated backdoor that has targeted Microsoft Exchange servers since at least 2014. LightNeuron has been used by Turla to target diplomatic and foreign affairs-related organizations. The presence of certain strings in the malware suggests a Linux variant of LightNeuron exists.[1] References: |
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2020-03-30 02:59:20.670000+00:00 | 2024-04-11 01:37:19.602000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 1.1 | 1.2 |
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2021-11-29 21:48:51.029000+00:00 | 2024-04-11 02:16:42.727000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 1.2 | 1.3 |
| Description |
|---|
Exaramel for Linux is a backdoor written in the Go Programming Language and compiled as a 64-bit ELF binary. The Windows version is tracked separately under Exaramel for Windows.[1] References: |
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2021-04-14 22:43:50.451000+00:00 | 2024-04-11 02:34:14.304000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 1.2 | 1.3 |
| Description |
|---|
BOOSTWRITE is a loader crafted to be launched via abuse of the DLL search order of applications used by FIN7.[1] References: |
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2019-10-15 17:07:57.638000+00:00 | 2024-04-11 02:48:51.475000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 1.0 | 1.1 |
| Description |
|---|
Winnti for Linux is a trojan, seen since at least 2015, designed specifically for targeting Linux systems. Reporting indicates the winnti malware family is shared across a number of actors including Winnti Group. The Windows variant is tracked separately under Winnti for Windows.[1] References: |
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2020-07-01 18:34:02.367000+00:00 | 2024-04-10 20:36:12.150000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 1.0 | 1.1 |
| Description |
|---|
HotCroissant is a remote access trojan (RAT) attributed by U.S. government entities to malicious North Korean government cyber activity, tracked collectively as HIDDEN COBRA.[1] HotCroissant shares numerous code similarities with Rifdoor.[2] References: |
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2020-05-06 19:28:21.746000+00:00 | 2024-04-11 02:17:38.807000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 1.0 | 1.1 |
| Description |
|---|
Rifdoor is a remote access trojan (RAT) that shares numerous code similarities with HotCroissant.[1] References: |
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2020-05-08 00:24:24.402000+00:00 | 2024-04-11 00:14:59.199000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 1.0 | 1.1 |
| Description |
|---|
Attor is a Windows-based espionage platform that has been seen in use since 2013. Attor has a loadable plugin architecture to customize functionality for specific targets.[1] References: |
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2020-07-07 12:35:11.897000+00:00 | 2024-04-11 02:57:38.076000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 1.0 | 1.1 |
| Description |
|---|
Rising Sun is a modular backdoor that was used extensively in Operation Sharpshooter between 2017 and 2019. Rising Sun infected at least 87 organizations around the world, including nuclear, defense, energy, and financial service companies. Security researchers assessed Rising Sun included some source code from Lazarus Group's Trojan Duuzer.[1] References: |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2022-10-13 15:46:29.677000+00:00 | 2024-04-11 00:14:23.264000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 2.0 | 2.1 |
| Description |
|---|
LoudMiner is a cryptocurrency miner which uses virtualization software to siphon system resources. The miner has been bundled with pirated copies of Virtual Studio Technology (VST) for Windows and macOS.[1] References: |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2023-03-22 04:51:42.922000+00:00 | 2024-04-11 01:36:42.906000+00:00 |
| x_mitre_attack_spec_version | 3.1.0 | 3.2.0 |
| x_mitre_version | 1.3 | 1.4 |
| Description |
|---|
Metamorfo is a Latin-American banking trojan operated by a Brazilian cybercrime group that has been active since at least April 2018. The group focuses on targeting banks and cryptocurrency services in Brazil and Mexico.[1][2] References: |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2022-10-18 23:23:55.295000+00:00 | 2024-04-11 00:44:30.028000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 2.0 | 2.1 |
| Description |
|---|
Aria-body is a custom backdoor that has been used by Naikon since approximately 2017.[1] References: |
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2021-08-19 17:58:43.342000+00:00 | 2024-04-11 02:58:53.131000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 1.1 | 1.2 |
| Description |
|---|
CARROTBAT is a customized dropper that has been in use since at least 2017. CARROTBAT has been used to install SYSCON and has infrastructure overlap with KONNI.[1][2] References:
|
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2023-03-22 03:24:06.264000+00:00 | 2024-04-11 02:46:42.264000+00:00 |
| x_mitre_attack_spec_version | 3.1.0 | 3.2.0 |
| x_mitre_version | 1.1 | 1.2 |
| Description |
|---|
WindTail is a macOS surveillance implant used by Windshift. WindTail shares code similarities with Hack Back aka KitM OSX.[1][2][3] References:
|
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2022-04-20 22:03:11.833000+00:00 | 2024-04-10 20:39:43.747000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 1.0 | 1.1 |
| Description |
|---|
Skidmap is a kernel-mode rootkit used for cryptocurrency mining.[1] References: |
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2020-06-26 04:03:50.568000+00:00 | 2024-04-11 00:06:31.222000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 1.0 | 1.1 |
| Description |
|---|
Avenger is a downloader that has been used by BRONZE BUTLER since at least 2019.[1] References: |
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2020-06-24 17:44:18.663000+00:00 | 2024-04-11 02:56:34.181000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 1.0 | 1.1 |
| Description |
|---|
IcedID is a modular banking malware designed to steal financial information that has been observed in the wild since at least 2017. IcedID has been downloaded by Emotet in multiple campaigns.[1][2] References: |
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2020-08-14 14:25:53.721000+00:00 | 2024-04-11 02:16:08.503000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 1.0 | 1.1 |
| Description |
|---|
Carberp is a credential and information stealing malware that has been active since at least 2009. Carberp's source code was leaked online in 2013, and subsequently used as the foundation for the Carbanak backdoor.[1][2][3] References:
|
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2021-08-25 20:08:29.545000+00:00 | 2024-04-11 02:47:56.829000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 1.1 | 1.2 |
| Description |
|---|
Kessel is an advanced version of OpenSSH which acts as a custom backdoor, mainly acting to steal credentials and function as a bot. Kessel has been active since its C2 domain began resolving in August 2018.[1] References: |
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2020-08-10 19:43:38.144000+00:00 | 2024-04-11 01:48:38.105000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 1.0 | 1.1 |
| Description |
|---|
CrackMapExec, or CME, is a post-exploitation tool developed in Python and designed for penetration testing against networks. CrackMapExec collects Active Directory information to conduct lateral movement through targeted networks.[1] References: |
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2020-07-29 20:19:40.544000+00:00 | 2024-03-14 17:29:49.200000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 1.0 | 1.1 |
| Description |
|---|
StrongPity is an information stealing malware used by PROMETHIUM.[1][2] References: |
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2020-10-15 02:00:29.185000+00:00 | 2024-04-10 23:47:16.416000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 1.0 | 1.1 |
| Description |
|---|
GoldenSpy is a backdoor malware which has been packaged with legitimate tax preparation software. GoldenSpy was discovered targeting organizations in China, being delivered with the "Intelligent Tax" software suite which is produced by the Golden Tax Department of Aisino Credit Information Co. and required to pay local taxes.[1] References: |
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2020-08-19 16:31:40.508000+00:00 | 2024-04-11 02:27:23.911000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 1.0 | 1.1 |
| Description |
|---|
REvil is a ransomware family that has been linked to the GOLD SOUTHFIELD group and operated as ransomware-as-a-service (RaaS) since at least April 2019. REvil, which as been used against organizations in the manufacturing, transportation, and electric sectors, is highly configurable and shares code similarities with the GandCrab RaaS.[1][2][3] References:
|
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2023-03-26 20:06:33.317000+00:00 | 2024-04-11 00:15:32.724000+00:00 |
| x_mitre_attack_spec_version | 3.1.0 | 3.2.0 |
| x_mitre_version | 2.1 | 2.2 |
| Description |
|---|
Dacls is a multi-platform remote access tool used by Lazarus Group since at least December 2019.[1][2] References: |
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2020-09-02 18:48:58.442000+00:00 | 2024-04-11 02:43:00.252000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 1.0 | 1.1 |
| Description |
|---|
PipeMon is a multi-stage modular backdoor used by Winnti Group.[1] References: |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2023-03-26 19:38:46.705000+00:00 | 2024-04-11 00:26:37.214000+00:00 |
| x_mitre_attack_spec_version | 3.1.0 | 3.2.0 |
| x_mitre_version | 1.1 | 1.2 |
| Description |
|---|
Anchor is one of a family of backdoor malware that has been used in conjunction with TrickBot on selected high profile targets since at least 2018.[1][2] References: |
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2021-12-15 20:56:24.628000+00:00 | 2023-12-04 20:02:47.052000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 1.0 | 1.1 |
| Description |
|---|
BLINDINGCAN is a remote access Trojan that has been used by the North Korean government since at least early 2020 in cyber operations against defense, engineering, and government organizations in Western Europe and the US.[1][2] References: |
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2021-03-17 15:55:56.257000+00:00 | 2024-04-11 02:51:38.922000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 1.0 | 1.1 |
| Description |
|---|
KGHSPY is a modular suite of tools used by Kimsuky for reconnaissance, information stealing, and backdoor capabilities. KGHSPY derived its name from PDB paths and internal names found in samples containing "KGH".[1] References: |
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2021-04-22 13:42:18.822000+00:00 | 2024-04-11 01:45:40.875000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 1.0 | 1.1 |
| Description |
|---|
Melcoz is a banking trojan family built from the open source tool Remote Access PC. Melcoz was first observed in attacks in Brazil and since 2018 has spread to Chile, Mexico, Spain, and Portugal.[1] References: |
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2020-12-22 21:20:18.142000+00:00 | 2024-03-29 18:12:59.212000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 1.0 | 1.1 |
| Description |
|---|
Grandoreiro is a banking trojan written in Delphi that was first observed in 2016 and uses a Malware-as-a-Service (MaaS) business model. Grandoreiro has confirmed victims in Brazil, Mexico, Portugal, and Spain.[1][2] References: |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2023-03-26 19:05:29.235000+00:00 | 2024-04-11 02:25:51.549000+00:00 |
| x_mitre_attack_spec_version | 3.1.0 | 3.2.0 |
| x_mitre_version | 1.1 | 1.2 |
| Description |
|---|
Bazar is a downloader and backdoor that has been used since at least April 2020, with infections primarily against professional services, healthcare, manufacturing, IT, logistics and travel companies across the US and Europe. Bazar reportedly has ties to TrickBot campaigns and can be used to deploy additional malware, including ransomware, and to steal sensitive data.[1] References: |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2022-09-29 20:41:20.065000+00:00 | 2023-12-04 19:42:13.073000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 1.2 | 2.0 |
Iterable Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| external_references | {'source_name': 'Bazaloader', 'description': '(Citation: Microsoft Ransomware as a Service)'} | |
| external_references | {'source_name': 'Microsoft Ransomware as a Service', 'description': 'Microsoft. (2022, May 9). Ransomware as a service: Understanding the cybercrime gig economy and how to protect yourself. Retrieved March 10, 2023.', 'url': 'https://www.microsoft.com/en-us/security/blog/2022/05/09/ransomware-as-a-service-understanding-the-cybercrime-gig-economy-and-how-to-protect-yourself/'} | |
| x_mitre_aliases | Bazaloader |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2023-08-09 16:50:06.756000+00:00 | 2024-04-04 03:49:04.493000+00:00 |
| x_mitre_attack_spec_version | 3.1.0 | 3.2.0 |
| x_mitre_version | 1.3 | 1.4 |
| Description |
|---|
SUNBURST is a trojanized DLL designed to fit within the SolarWinds Orion software update framework. It was used by APT29 since at least February 2020.[1][2] References:
|
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2023-03-27 20:01:39.552000+00:00 | 2023-12-26 19:44:49.643000+00:00 |
| x_mitre_attack_spec_version | 3.1.0 | 3.2.0 |
| x_mitre_version | 2.4 | 2.5 |
| Description |
|---|
Raindrop is a loader used by APT29 that was discovered on some victim machines during investigations related to the SolarWinds Compromise. It was discovered in January 2021 and was likely used since at least May 2020.[1][2] References:
|
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2023-03-27 19:53:24.461000+00:00 | 2024-04-11 00:23:21.599000+00:00 |
| x_mitre_attack_spec_version | 3.1.0 | 3.2.0 |
| x_mitre_version | 1.2 | 1.3 |
| Description |
|---|
BitPaymer is a ransomware variant first observed in August 2017 targeting hospitals in the U.K. BitPaymer uses a unique encryption key, ransom note, and contact information for each operation. BitPaymer has several indicators suggesting overlap with the Dridex malware and is often delivered via Dridex.[1] References: |
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2021-04-26 22:04:32.509000+00:00 | 2024-04-11 02:52:57.879000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 1.0 | 1.1 |
| Description |
|---|
BendyBear is an x64 shellcode for a stage-zero implant designed to download malware from a C2 server. First discovered in August 2020, BendyBear shares a variety of features with Waterbear, malware previously attributed to the Chinese cyber espionage group BlackTech.[1] References: |
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2021-04-21 15:02:21.066000+00:00 | 2024-04-11 02:54:10.246000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 1.0 | 1.1 |
| Description |
|---|
SUPERNOVA is an in-memory web shell written in .NET C#. It was discovered in November 2020 during the investigation of APT29's SolarWinds cyber operation but determined to be unrelated. Subsequent analysis suggests SUPERNOVA may have been used by the China-based threat group SPIRAL.[1][2][3][4][5] References:
|
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2021-04-23 23:00:41.648000+00:00 | 2024-04-10 23:45:34.261000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 1.0 | 1.1 |
| Description |
|---|
Waterbear is modular malware attributed to BlackTech that has been used primarily for lateral movement, decrypting, and triggering payloads and is capable of hiding network behaviors.[1] References: |
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2022-03-25 16:46:35.932000+00:00 | 2024-04-10 22:14:28.440000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 1.1 | 1.2 |
| Description |
|---|
IronNetInjector is a Turla toolchain that utilizes scripts from the open-source IronPython implementation of Python with a .NET injector to drop one or more payloads including ComRAT.[1] References: |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2022-05-20 17:02:59.587000+00:00 | 2024-04-11 02:14:36.791000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 1.0 | 1.1 |
| Description |
|---|
Penquin is a remote access trojan (RAT) with multiple versions used by Turla to target Linux systems since at least 2014.[1][2] References: |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2022-10-20 04:12:29.037000+00:00 | 2024-04-11 00:27:30.199000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 1.1 | 1.2 |
| Description |
|---|
GoldMax is a second-stage C2 backdoor written in Go with Windows and Linux variants that are nearly identical in functionality. GoldMax was discovered in early 2021 during the investigation into the SolarWinds Compromise, and has likely been used by APT29 since at least mid-2019. GoldMax uses multiple defense evasion techniques, including avoiding virtualization execution and masking malicious traffic.[1][2][3] References:
|
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2023-08-30 16:31:52.140000+00:00 | 2024-04-11 02:26:45.606000+00:00 |
| x_mitre_attack_spec_version | 3.1.0 | 3.2.0 |
| x_mitre_version | 2.2 | 2.3 |
| Description |
|---|
Hildegard is malware that targets misconfigured kubelets for initial access and runs cryptocurrency miner operations. The malware was first observed in January 2021. The TeamTNT activity group is believed to be behind Hildegard. [1] References: |
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2021-10-16 01:49:39.189000+00:00 | 2024-04-11 02:18:41.342000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 1.1 | 1.2 |
| Description |
|---|
Stuxnet was the first publicly reported piece of malware to specifically target industrial control systems devices. Stuxnet is a large and complex piece of malware that utilized multiple different behaviors including multiple zero-day vulnerabilities, a sophisticated Windows rootkit, and network infection routines.[1][2][3][4] Stuxnet was discovered in 2010, with some components being used as early as November 2008.[1] References:
|
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2023-03-20 13:50:55.168000+00:00 | 2024-04-10 23:46:32.577000+00:00 |
| x_mitre_attack_spec_version | 3.1.0 | 3.2.0 |
| x_mitre_version | 1.3 | 1.4 |
| Description |
|---|
Industroyer is a sophisticated malware framework designed to cause an impact to the working processes of Industrial Control Systems (ICS), specifically components used in electrical substations.[1] Industroyer was used in the attacks on the Ukrainian power grid in December 2016.[2] This is the first publicly known malware specifically designed to target and impact operations in the electric grid.[3] References:
|
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2023-10-17 20:09:38.062000+00:00 | 2024-04-11 16:06:34.700000+00:00 |
| x_mitre_contributors[0] | Dragos Threat Intelligence | Dragos Threat Intelligence |
| Description |
|---|
WastedLocker is a ransomware family attributed to Indrik Spider that has been used since at least May 2020. WastedLocker has been used against a broad variety of sectors, including manufacturing, information technology, and media.[1][2][3] References:
|
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2021-09-27 17:36:37.593000+00:00 | 2024-03-25 19:46:59.150000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 1.0 | 1.1 |
| Description |
|---|
PS1 is a loader that was used to deploy 64-bit backdoors in the CostaRicto campaign.[1] References: |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2022-10-05 16:04:51.193000+00:00 | 2024-04-11 00:25:13.397000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 1.1 | 1.2 |
| Description |
|---|
FIVEHANDS is a customized version of DEATHRANSOM ransomware written in C++. FIVEHANDS has been used since at least 2021, including in Ransomware-as-a-Service (RaaS) campaigns, sometimes along with SombRAT.[1][2] References: |
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2021-10-18 17:52:32.865000+00:00 | 2024-04-11 02:33:06.963000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 1.0 | 1.1 |
| Description |
|---|
RainyDay is a backdoor tool that has been used by Naikon since at least 2020.[1] References: |
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2021-08-19 19:14:14.922000+00:00 | 2024-04-11 00:22:35.591000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 1.0 | 1.1 |
| Description |
|---|
Sliver is an open source, cross-platform, red team command and control framework written in Golang.[1] References: |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2023-01-17 22:14:02.852000+00:00 | 2024-04-11 00:06:01.264000+00:00 |
| x_mitre_attack_spec_version | 3.1.0 | 3.2.0 |
| x_mitre_version | 1.1 | 1.2 |
| Description |
|---|
EnvyScout is a dropper that has been used by APT29 since at least 2021.[1] References: |
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2021-10-16 01:24:29.056000+00:00 | 2024-04-11 02:34:42.912000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 1.0 | 1.1 |
| Description |
|---|
QakBot is a modular banking trojan that has been used primarily by financially-motivated actors since at least 2007. QakBot is continuously maintained and developed and has evolved from an information stealer into a delivery agent for ransomware, most notably ProLock and Egregor.[1][2][3][4] References:
|
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2023-05-01 17:05:20.902000+00:00 | 2023-12-05 20:22:37.368000+00:00 |
| x_mitre_attack_spec_version | 3.1.0 | 3.2.0 |
| x_mitre_version | 1.1 | 1.2 |
| Description |
|---|
BLUELIGHT is a remote access Trojan used by APT37 that was first observed in early 2021.[1] References: |
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2021-10-15 21:00:52.016000+00:00 | 2024-04-11 02:49:24.851000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 1.0 | 1.1 |
| Modified Description View changes side-by-side |
|---|
| [Diavol](https://attack.mitre.org/software/S0659) is a ransomware variant first observed in June 2021 that is capable of prioritizing file types to encrypt based on a pre-configured list of extensions defined by the attacker. The [Diavol](https://attack.mitre.org/software/S0659) Ransomware-as-a Service (RaaS) program is managed by [Wizard Spider](https://attack.mitre.org/groups/G0102) and it has been observed being deployed by [Bazar](https://attack.mitre.org/software/S0534) and is thought to have potential ties to [Wizard Spider](https://attack.mitre.org/groups/G0102).(Citation: [Bazar](https://attack.mitre.org/software/S0534).(Citation: Fortinet Diavol July 2021)(Citation: FBI Flash Diavol January 2022)(Citation: DFIR Diavol Ransomware December 2021) 2021)(Citation: Microsoft Ransomware as a Service) |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2022-04-15 00:59:33.522000+00:00 | 2023-12-04 20:15:22.258000+00:00 |
| description | [Diavol](https://attack.mitre.org/software/S0659) is a ransomware variant first observed in June 2021 that is capable of prioritizing file types to encrypt based on a pre-configured list of extensions defined by the attacker. [Diavol](https://attack.mitre.org/software/S0659) has been deployed by [Bazar](https://attack.mitre.org/software/S0534) and is thought to have potential ties to [Wizard Spider](https://attack.mitre.org/groups/G0102).(Citation: Fortinet Diavol July 2021)(Citation: FBI Flash Diavol January 2022)(Citation: DFIR Diavol Ransomware December 2021) | [Diavol](https://attack.mitre.org/software/S0659) is a ransomware variant first observed in June 2021 that is capable of prioritizing file types to encrypt based on a pre-configured list of extensions defined by the attacker. The [Diavol](https://attack.mitre.org/software/S0659) Ransomware-as-a Service (RaaS) program is managed by [Wizard Spider](https://attack.mitre.org/groups/G0102) and it has been observed being deployed by [Bazar](https://attack.mitre.org/software/S0534).(Citation: Fortinet Diavol July 2021)(Citation: FBI Flash Diavol January 2022)(Citation: DFIR Diavol Ransomware December 2021)(Citation: Microsoft Ransomware as a Service) |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 1.0 | 2.0 |
Iterable Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| external_references | {'source_name': 'Microsoft Ransomware as a Service', 'description': 'Microsoft. (2022, May 9). Ransomware as a service: Understanding the cybercrime gig economy and how to protect yourself. Retrieved March 10, 2023.', 'url': 'https://www.microsoft.com/en-us/security/blog/2022/05/09/ransomware-as-a-service-understanding-the-cybercrime-gig-economy-and-how-to-protect-yourself/'} |
| Description |
|---|
FoggyWeb is a passive and highly-targeted backdoor capable of remotely exfiltrating sensitive information from a compromised Active Directory Federated Services (AD FS) server. It has been used by APT29 since at least early April 2021.[1] References: |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2022-04-15 16:34:44.709000+00:00 | 2024-04-11 02:32:04.884000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 1.0 | 1.1 |
| Description |
|---|
RCSession is a backdoor written in C++ that has been in use since at least 2018 by Mustang Panda and by Threat Group-3390 (Type II Backdoor).[1][2][3] References:
|
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2023-03-26 19:54:58.293000+00:00 | 2024-04-11 00:21:49.455000+00:00 |
| x_mitre_attack_spec_version | 3.1.0 | 3.2.0 |
| x_mitre_version | 1.1 | 1.2 |
| Description |
|---|
SysUpdate is a backdoor written in C++ that has been used by Threat Group-3390 since at least 2020.[1] References: |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2023-03-20 16:32:21.733000+00:00 | 2024-04-10 23:44:19.752000+00:00 |
| x_mitre_attack_spec_version | 3.1.0 | 3.2.0 |
| x_mitre_version | 1.1 | 1.2 |
| Description |
|---|
ThreatNeedle is a backdoor that has been used by Lazarus Group since at least 2019 to target cryptocurrency, defense, and mobile gaming organizations. It is considered to be an advanced cluster of Lazarus Group's Manuscrypt (a.k.a. NukeSped) malware family.[1] References: |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2023-03-26 20:18:23.760000+00:00 | 2024-04-10 22:32:30.915000+00:00 |
| x_mitre_attack_spec_version | 3.1.0 | 3.2.0 |
| x_mitre_version | 1.1 | 1.2 |
| Description |
|---|
Gelsemium is a modular malware comprised of a dropper (Gelsemine), a loader (Gelsenicine), and main (Gelsevirine) plug-ins written using the Microsoft Foundation Class (MFC) framework. Gelsemium has been used by the Gelsemium group since at least 2014.[1] References: |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2023-03-26 19:02:24.792000+00:00 | 2024-04-11 02:28:01.735000+00:00 |
| x_mitre_attack_spec_version | 3.1.0 | 3.2.0 |
| x_mitre_version | 1.1 | 1.2 |
| Description |
|---|
Chrommme is a backdoor tool written using the Microsoft Foundation Class (MFC) framework that was first reported in June 2021; security researchers noted infrastructure overlaps with Gelsemium malware.[1] References: |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2022-05-04 22:38:46.222000+00:00 | 2024-04-11 02:45:43.666000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 1.0 | 1.1 |
| Description |
|---|
DarkWatchman is a lightweight JavaScript-based remote access tool (RAT) that avoids file operations; it was first observed in November 2021.[1] References: |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2023-03-22 03:34:53.944000+00:00 | 2024-04-11 02:40:18.361000+00:00 |
| x_mitre_attack_spec_version | 3.1.0 | 3.2.0 |
| x_mitre_version | 1.1 | 1.2 |
| Description |
|---|
Torisma is a second stage implant designed for specialized monitoring that has been used by Lazarus Group. Torisma was discovered during an investigation into the 2020 Operation North Star campaign that targeted the defense sector.[1] References: |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2023-03-21 11:45:38.621000+00:00 | 2024-04-10 22:31:28.094000+00:00 |
| x_mitre_attack_spec_version | 3.1.0 | 3.2.0 |
| x_mitre_version | 1.1 | 1.2 |
| Description |
|---|
WhisperGate is a multi-stage wiper designed to look like ransomware that has been used against multiple government, non-profit, and information technology organizations in Ukraine since at least January 2022.[1][2][3] References:
|
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2023-04-05 20:48:07.280000+00:00 | 2024-04-10 22:13:49.349000+00:00 |
| x_mitre_attack_spec_version | 3.1.0 | 3.2.0 |
| x_mitre_version | 1.1 | 1.2 |
| Description |
|---|
CaddyWiper is a destructive data wiper that has been used in attacks against organizations in Ukraine since at least March 2022.[1][2] References: |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2022-04-11 20:38:33.997000+00:00 | 2024-04-17 15:09:37.646000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 1.0 | 1.1 |
| Description |
|---|
HermeticWiper is a data wiper that has been used since at least early 2022, primarily against Ukraine with additional activity observed in Latvia and Lithuania. Some sectors targeted include government, financial, defense, aviation, and IT services.[1][2][3][4][5] References:
|
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2022-10-18 23:19:38.268000+00:00 | 2024-04-11 02:22:04.078000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 1.0 | 1.1 |
| Description |
|---|
HermeticWizard is a worm that has been used to spread HermeticWiper in attacks against organizations in Ukraine since at least 2022.[1] References: |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2022-04-11 00:11:44.579000+00:00 | 2024-04-11 02:21:28.830000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 1.0 | 1.1 |
| Description |
|---|
ZxxZ is a trojan written in Visual C++ that has been used by BITTER since at least August 2021, including against Bangladeshi government personnel.[1] References: |
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_aliases | ['ZxxZ'] |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2022-06-02 12:27:58.811000+00:00 | 2024-04-10 20:29:50.729000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 1.0 | 1.1 |
| Description |
|---|
DanBot is a first-stage remote access Trojan written in C# that has been used by HEXANE since at least 2018.[1] References: |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2022-09-01 14:11:46.207000+00:00 | 2024-04-11 02:42:34.540000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 1.0 | 1.1 |
| Description |
|---|
Milan is a backdoor implant based on DanBot that was written in Visual C++ and .NET. Milan has been used by HEXANE since at least June 2020.[1][2] References: |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2022-08-31 21:45:17.174000+00:00 | 2024-04-11 00:43:16.261000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 1.0 | 1.1 |
| Description |
|---|
Shark is a backdoor malware written in C# and .NET that is an updated version of Milan; it has been used by HEXANE since at least July 2021.[1][2] References: |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2022-08-31 21:47:57.382000+00:00 | 2024-04-11 00:08:18.570000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 1.0 | 1.1 |
| Description |
|---|
Kevin is a backdoor implant written in C++ that has been used by HEXANE since at least June 2020, including in operations against organizations in Tunisia.[1] References: |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2022-08-31 16:38:11.028000+00:00 | 2024-04-17 22:07:06.736000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 1.0 | 1.1 |
| Description |
|---|
Heyoka Backdoor is a custom backdoor--based on the Heyoka open source exfiltration tool--that has been used by Aoqin Dragon since at least 2013.[1][2] References: |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2022-10-24 18:54:09.655000+00:00 | 2024-04-11 02:20:55.694000+00:00 |
| x_mitre_attack_spec_version | 3.0.0 | 3.2.0 |
| x_mitre_version | 1.0 | 1.1 |
| Description |
|---|
Squirrelwaffle is a loader that was first seen in September 2021. It has been used in spam email campaigns to deliver additional malware such as Cobalt Strike and the QakBot banking trojan.[1][2] References: |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2022-08-26 21:08:39.890000+00:00 | 2024-04-11 00:02:15.805000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 1.0 | 1.1 |
| Description |
|---|
PyDCrypt is malware written in Python designed to deliver DCSrv. It has been used by Moses Staff since at least September 2021, with each sample tailored for its intended victim organization.[1] References: |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2022-10-24 18:54:58.048000+00:00 | 2024-04-11 00:23:58.415000+00:00 |
| x_mitre_attack_spec_version | 3.0.0 | 3.2.0 |
| x_mitre_version | 1.0 | 1.1 |
| Description |
|---|
DCSrv is destructive malware that has been used by Moses Staff since at least September 2021. Though DCSrv has ransomware-like capabilities, Moses Staff does not demand ransom or offer a decryption key.[1] References: |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2022-10-24 18:55:25.261000+00:00 | 2024-04-11 02:39:27.698000+00:00 |
| x_mitre_attack_spec_version | 3.0.0 | 3.2.0 |
| x_mitre_version | 1.0 | 1.1 |
| Description |
|---|
STARWHALE is Windows Script File (WSF) backdoor that has been used by MuddyWater, possibly since at least November 2021; there is also a STARWHALE variant written in Golang with similar capabilities. Security researchers have also noted the use of STARWHALE by UNC3313, which may be associated with MuddyWater.[1][2] References:
|
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2022-10-14 15:23:17.961000+00:00 | 2024-04-11 00:01:29.506000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 1.0 | 1.1 |
| Description |
|---|
Rclone is a command line program for syncing files with cloud storage services such as Dropbox, Google Drive, Amazon S3, and MEGA. Rclone has been used in a number of ransomware campaigns, including those associated with the Conti and DarkSide Ransomware-as-a-Service operations.[1][2][3][4][5] References:
|
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2023-04-13 13:14:41.257000+00:00 | 2024-04-04 03:50:32.975000+00:00 |
| x_mitre_attack_spec_version | 3.1.0 | 3.2.0 |
| x_mitre_version | 1.0 | 1.1 |
| Description |
|---|
Chinoxy is a backdoor that has been used since at least November 2018, during the FunnyDream campaign, to gain persistence and drop additional payloads. According to security researchers, Chinoxy has been used by Chinese-speaking threat actors.[1] References: |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2022-10-10 19:58:31.652000+00:00 | 2024-04-11 02:46:10.914000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 1.0 | 1.1 |
| Description |
|---|
FunnyDream is a backdoor with multiple components that was used during the FunnyDream campaign since at least 2019, primarily for execution and exfiltration.[1] References: |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2022-10-11 12:33:19.525000+00:00 | 2024-04-11 02:30:25.854000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 1.0 | 1.1 |
| Description |
|---|
PcShare is an open source remote access tool that has been modified and used by Chinese threat actors, most notably during the FunnyDream campaign since late 2018.[1][2] References: |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2022-10-13 14:12:41.582000+00:00 | 2024-04-11 00:28:17.175000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 1.0 | 1.1 |
| Description |
|---|
KEYPLUG is a modular backdoor written in C++, with Windows and Linux variants, that has been used by APT41 since at least June 2021.[1] References: |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2022-12-12 15:47:46.797000+00:00 | 2024-04-11 01:46:20.169000+00:00 |
| x_mitre_attack_spec_version | 3.1.0 | 3.2.0 |
| x_mitre_version | 1.0 | 1.1 |
| Description |
|---|
DEADEYE is a malware launcher that has been used by APT41 since at least May 2021. DEADEYE has variants that can either embed a payload inside a compiled binary (DEADEYE.EMBED) or append it to the end of a file (DEADEYE.APPEND).[1] References: |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2023-04-07 19:30:56.058000+00:00 | 2024-04-11 02:38:56.409000+00:00 |
| x_mitre_attack_spec_version | 3.1.0 | 3.2.0 |
| x_mitre_version | 1.0 | 1.1 |
| Description |
|---|
metaMain is a backdoor used by Metador to maintain long-term access to compromised machines; it has also been used to decrypt Mafalda into memory.[1][2] References: |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2023-04-05 14:09:42.670000+00:00 | 2024-04-11 00:45:31.029000+00:00 |
| x_mitre_attack_spec_version | 3.1.0 | 3.2.0 |
| x_mitre_version | 1.0 | 1.1 |
| Description |
|---|
Mafalda is a flexible interactive implant that has been used by Metador. Security researchers assess the Mafalda name may be inspired by an Argentinian cartoon character that has been popular as a means of political commentary since the 1960s. [1] References: |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2023-04-04 21:05:06.549000+00:00 | 2024-04-11 00:49:47.226000+00:00 |
| x_mitre_attack_spec_version | 3.1.0 | 3.2.0 |
| x_mitre_version | 1.0 | 1.1 |
| Description |
|---|
Woody RAT is a remote access trojan (RAT) that has been used since at least August 2021 against Russian organizations.[1] References: |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2023-04-17 14:58:02.400000+00:00 | 2024-04-10 20:34:14.166000+00:00 |
| x_mitre_attack_spec_version | 3.1.0 | 3.2.0 |
| x_mitre_version | 1.0 | 1.1 |
| Description |
|---|
BADHATCH is a backdoor that has been utilized by FIN8 since at least 2019. BADHATCH has been used to target the insurance, retail, technology, and chemical industries in the United States, Canada, South Africa, Panama, and Italy.[1][2] References: |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2023-10-04 16:53:23.530000+00:00 | 2024-04-11 02:55:51.310000+00:00 |
| x_mitre_version | 1.0 | 1.1 |