Center for Threat-Informed Defense

Version 15.1 16.0

Software : Enterprise ATT&CK Changelog

Added Software

Description

VPNFilter is a multi-stage, modular platform with versatile capabilities to support both intelligence-collection and destructive cyber attack operations. VPNFilter modules such as its packet sniffer ('ps') can collect traffic that passes through an infected device, allowing the theft of website credentials and monitoring of Modbus SCADA protocols. [1] [2] VPNFilter was assessed to be replaced by Sandworm Team with Cyclops Blink starting in 2019.[3]

References:

  1. William Largent 2018, June 06 VPNFilter Update - VPNFilter exploits endpoints, targets new devices Retrieved. 2019/03/28
  2. Carl Hurd 2019, March 26 VPNFilter Deep Dive Retrieved. 2019/03/28
  3. NCSC, CISA, FBI, NSA. (2022, February 23). New Sandworm malware Cyclops Blink replaces VPNFilter. Retrieved March 3, 2022.

Description

Raspberry Robin is initial access malware first identified in September 2021, and active through early 2024. The malware is notable for spreading via infected USB devices containing a malicious LNK object that, on execution, retrieves remote hosted payloads for installation. Raspberry Robin has been widely used against various industries and geographies, and as a precursor to information stealer, ransomware, and other payloads such as SocGholish, Cobalt Strike, IcedID, and Bumblebee.[1][2][3] The DLL componenet in the Raspberry Robin infection chain is also referred to as "Roshtyak."[4] The name "Raspberry Robin" is used to refer to both the malware as well as the threat actor associated with its use, although the Raspberry Robin operators are also tracked as Storm-0856 by some vendors.[5]

References:

  1. Christopher So. (2022, December 20). Raspberry Robin Malware Targets Telecom, Governments. Retrieved May 17, 2024.
  2. Lauren Podber and Stef Rand. (2022, May 5). Raspberry Robin gets the worm early. Retrieved May 17, 2024.
  3. Patrick Schläpfer . (2024, April 10). Raspberry Robin Now Spreading Through Windows Script Files. Retrieved May 17, 2024.
  4. Jan Vojtěšek. (2022, September 22). Raspberry Robin’s Roshtyak: A Little Lesson in Trickery. Retrieved May 17, 2024.
  5. Microsoft Threat Intelligence. (2022, October 27). Raspberry Robin worm part of larger ecosystem facilitating pre-ransomware activity. Retrieved May 17, 2024.

Description

NPPSPY is an implementation of a theoretical mechanism first presented in 2004 for capturing credentials submitted to a Windows system via a rogue Network Provider API item. NPPSPY captures credentials following submission and writes them to a file on the victim system for follow-on exfiltration.[1][2]

References:

  1. Dray Agha. (2022, August 16). Cleartext Shenanigans: Gifting User Passwords to Adversaries With NPPSPY. Retrieved May 17, 2024.
  2. Sergey Polak. (2004, August). Capturing Windows Passwords using the Network Provider API. Retrieved May 17, 2024.

Description

IPsec Helper is a post-exploitation remote access tool linked to Agrius operations. This malware shares significant programming and functional overlaps with Apostle ransomware, also linked to Agrius. IPsec Helper provides basic remote access tool functionality such as uploading files from victim systems, running commands, and deploying additional payloads.[1]

References:

  1. Amitai Ben & Shushan Ehrlich. (2021, May). From Wiper to Ransomware: The Evolution of Agrius. Retrieved May 21, 2024.

Description

Apostle is malware that has functioned as both a wiper and, in more recent versions, as ransomware. Apostle is written in .NET and shares various programming and functional overlaps with IPsec Helper.[1]

References:

  1. Amitai Ben & Shushan Ehrlich. (2021, May). From Wiper to Ransomware: The Evolution of Agrius. Retrieved May 21, 2024.

Description

DEADWOOD is wiper malware written in C++ using Boost libraries. DEADWOOD was first observed in an unattributed wiping event in Saudi Arabia in 2019, and has since been incorporated into Agrius operations.[1]

References:

  1. Amitai Ben & Shushan Ehrlich. (2021, May). From Wiper to Ransomware: The Evolution of Agrius. Retrieved May 21, 2024.

Description

MultiLayer Wiper is wiper malware written in .NET associated with Agrius operations. Observed samples of MultiLayer Wiper have an anomalous, future compilation date suggesting possible metadata manipulation.[1]

References:

  1. Or Chechik, Tom Fakterman, Daniel Frank & Assaf Dahan. (2023, November 6). Agonizing Serpens (Aka Agrius) Targeting the Israeli Higher Education and Tech Sectors. Retrieved May 22, 2024.

Description

BFG Agonizer is a wiper related to the open-source project CRYLINE-v.5.0. The malware is associated with wiping operations conducted by the Agrius threat actor.[1]

References:

  1. Or Chechik, Tom Fakterman, Daniel Frank & Assaf Dahan. (2023, November 6). Agonizing Serpens (Aka Agrius) Targeting the Israeli Higher Education and Tech Sectors. Retrieved May 22, 2024.

Description

Moneybird is a ransomware variant written in C++ associated with Agrius operations. The name "Moneybird" is contained in the malware's ransom note and as strings in the executable.[1]

References:

  1. Marc Salinas Fernandez & Jiri Vinopal. (2023, May 23). AGRIUS DEPLOYS MONEYBIRD IN TARGETED ATTACKS AGAINST ISRAELI ORGANIZATIONS. Retrieved May 21, 2024.

Description

Gootloader is a Javascript-based infection framework that has been used since at least 2020 as a delivery method for the Gootkit banking trojan, Cobalt Strike, REvil, and others. Gootloader operates on an "Initial Access as a Service" model and has leveraged SEO Poisoning to provide access to entities in multiple sectors worldwide including financial, military, automotive, pharmaceutical, and energy.[1][2]

References:

  1. Szappanos, G. & Brandt, A. (2021, March 1). “Gootloader” expands its payload delivery options. Retrieved September 30, 2022.
  2. Pirozzi, A. (2021, June 16). Gootloader: ‘Initial Access as a Service’ Platform Expands Its Search for High Value Targets. Retrieved May 28, 2024.

Description

INC Ransomware is a ransomware strain that has been used by the INC Ransom group since at least 2023 against multiple industry sectors worldwide. INC Ransomware can employ partial encryption combined with multi-threading to speed encryption.[1][2][3]

References:

  1. SentinelOne. (n.d.). What Is Inc. Ransomware?. Retrieved June 5, 2024.
  2. Team Huntress. (2023, August 11). Investigating New INC Ransom Group Activity. Retrieved June 5, 2024.
  3. Counter Threat Unit Research Team. (2024, April 15). GOLD IONIC DEPLOYS INC RANSOMWARE. Retrieved June 5, 2024.

Description

LunarWeb is a backdoor that has been used by Turla since at least 2020 including in a compromise of a European ministry of foreign affairs (MFA) together with LunarLoader and LunarMail. LunarWeb has only been observed deployed against servers and can use Steganography to obfuscate command and control.[1]

References:

  1. Jurčacko, F. (2024, May 15). To the Moon and back(doors): Lunar landing in diplomatic missions. Retrieved June 26, 2024.

Description

LunarMail is a backdoor that has been used by Turla since at least 2020 including in a compromise of a European ministry of foreign affairs (MFA) in conjunction with LunarLoader and LunarWeb. LunarMail is designed to be deployed on workstations and can use email messages and Steganography in command and control.[1]

References:

  1. Jurčacko, F. (2024, May 15). To the Moon and back(doors): Lunar landing in diplomatic missions. Retrieved June 26, 2024.

Description

LunarLoader is the loader component for the LunarWeb and LunarMail backdoors that has been used by Turla since at least 2020 including against a European ministry of foreign affairs (MFA). LunarLoader has been observed as a standalone and as a part of trojanized open-source software such as AdmPwd.[1]

References:

  1. Jurčacko, F. (2024, May 15). To the Moon and back(doors): Lunar landing in diplomatic missions. Retrieved June 26, 2024.

Description

FRP, which stands for Fast Reverse Proxy, is an openly available tool that is capable of exposing a server located behind a firewall or Network Address Translation (NAT) to the Internet. FRP can support multiple protocols including TCP, UDP, and HTTP(S) and has been abused by threat actors to proxy command and control communications.[1][2][3][4]

References:

  1. fatedier. (n.d.). What is frp?. Retrieved July 10, 2024.
  2. NSA et al. (2023, May 24). People's Republic of China State-Sponsored Cyber Actor Living off the Land to Evade Detection. Retrieved July 27, 2023.
  3. Lambert, T. (2020, May 7). Introducing Blue Mockingbird. Retrieved May 26, 2020.
  4. DFIR Report. (2021, November 15). Exchange Exploit Leads to Domain Wide Ransomware. Retrieved January 5, 2023.

Description

Pikabot is a backdoor used for initial access and follow-on tool deployment active since early 2023. Pikabot is notable for extensive use of multiple encoding, encryption, and defense evasion mechanisms to evade defenses and avoid analysis. Pikabot has some overlaps with QakBot, but insufficient evidence exists to definitively link these two malware families. Pikabot is frequently used to deploy follow on tools such as Cobalt Strike or ransomware variants.[1][2][3]

References:

  1. Brett Stone-Gross & Nikolaos Pantazopoulos. (2023, May 24). Technical Analysis of Pikabot. Retrieved July 12, 2024.
  2. Daniel Stepanic & Salim Bitam. (2024, February 23). PIKABOT, I choose you!. Retrieved July 12, 2024.
  3. Swachchhanda Shrawan Poudel. (2024, February). Pikabot: 
A Sophisticated and Modular Backdoor Trojan with Advanced Evasion Techniques. Retrieved July 12, 2024.

Description

MgBot is a modular malware framework exclusively associated with Daggerfly operations since at least 2012. MgBot was developed in C++ and features a module design with multiple available plugins that have been under active development through 2024.[1][2][3]

References:

  1. Gabor Szappanos. (2014, February 3). Needle in a haystack. Retrieved July 25, 2024.
  2. Facundo Muñoz. (2023, April 26). Evasive Panda APT group delivers malware via updates for popular Chinese software. Retrieved July 25, 2024.
  3. Threat Hunter Team. (2024, July 23). Daggerfly: Espionage Group Makes Major Update to Toolset. Retrieved July 25, 2024.

Description

Raccoon Stealer is an information stealer malware family active since at least 2019 as a malware-as-a-service offering sold in underground forums. Raccoon Stealer has experienced two periods of activity across two variants, from 2019 to March 2022, then resurfacing in a revised version in June 2022.[1][2]

References:

  1. S2W TALON. (2022, June 16). Raccoon Stealer is Back with a New Version. Retrieved August 1, 2024.
  2. Quentin Bourgue, Pierre le Bourhis, & Sekoia TDR. (2022, June 28). Raccoon Stealer v2 - Part 1: The return of the dead. Retrieved August 1, 2024.

Description

CHIMNEYSWEEP is a backdoor malware that was deployed during HomeLand Justice along with ROADSWEEP ransomware, and has been used to target Farsi and Arabic speakers since at least 2012.[1]

References:

  1. Jenkins, L. at al. (2022, August 4). ROADSWEEP Ransomware - Likely Iranian Threat Actor Conducts Politically Motivated Disruptive Activity Against Albanian Government Organizations. Retrieved August 6, 2024.

Description

IMAPLoader is a .NET-based loader malware exclusively associated with CURIUM operations since at least 2022. IMAPLoader leverages email protocols for command and control and payload delivery.[1]

References:

  1. PwC Threat Intelligence. (2023, October 25). Yellow Liderc ships its scripts and delivers IMAPLoader malware. Retrieved August 14, 2024.

Description

Cuckoo Stealer is a macOS malware with characteristics of spyware and an infostealer that has been in use since at least 2024. Cuckoo Stealer is a universal Mach-O binary that can run on Intel or ARM-based Macs and has been spread through trojanized versions of various potentially unwanted programs or PUP's such as converters, cleaners, and uninstallers.[1][2]

References:

  1. Kohler, A. and Lopez, C. (2024, April 30). Malware: Cuckoo Behaves Like Cross Between Infostealer and Spyware. Retrieved August 20, 2024.
  2. Stokes, P. (2024, May 9). macOS Cuckoo Stealer | Ensuring Detection and Defense as New Samples Rapidly Emerge. Retrieved August 20, 2024.

Description

VersaMem is a web shell designed for deployment to Versa Director servers following exploitation. Discovered in August 2024, VersaMem was used during Versa Director Zero Day Exploitation by Volt Typhoon to target ISPs and MSPs. VersaMem is deployed as a Java Archive (JAR) and allows for credential capture for Versa Director logon activity as well as follow-on execution of arbitrary Java payloads.[1]

References:

  1. Black Lotus Labs. (2024, August 27). Taking The Crossroads: The Versa Director Zero-Day Exploitaiton. Retrieved August 27, 2024.

Description

Covenant is a multi-platform command and control framework written in .NET. While designed for penetration testing and security research, the tool has also been used by threat actors such as HAFNIUM during operations. Covenant functions through a central listener managing multiple deployed "Grunts" that communicate back to the controller.[1][2]

References:

  1. cobbr. (2021, April 21). Covenant. Retrieved September 4, 2024.
  2. MSTIC. (2021, March 2). HAFNIUM targeting Exchange Servers with 0-day exploits. Retrieved March 3, 2021.

Description

Manjusaka is a Chinese-language intrusion framework, similar to Sliver and Cobalt Strike, with an ELF binary written in GoLang as the controller for Windows and Linux implants written in Rust. First identified in 2022, Manjusaka consists of multiple components, only one of which (a command and control module) is freely available.[1]

References:

  1. Asheer Malhotra & Vitor Ventura. (2022, August 2). Manjusaka: A Chinese sibling of Sliver and Cobalt Strike. Retrieved September 4, 2024.

Description

DUSTTRAP is a multi-stage plugin framework associated with APT41 operations with multiple components.[1]

References:

  1. Mike Stokkel et al. (2024, July 18). APT41 Has Arisen From the DUST. Retrieved September 16, 2024.

Description

Latrodectus is a Windows malware downloader that has been used since at least 2023 to download and execute additional payloads and modules. Latrodectus has most often been distributed through email campaigns, primarily by TA577 and TA578, and has infrastructure overlaps with historic IcedID operations.[1][2][3]

References:

  1. Proofpoint Threat Research and Team Cymru S2 Threat Research. (2024, April 4). Latrodectus: This Spider Bytes Like Ice . Retrieved May 31, 2024.
  2. Abrams, L. (2024, April 30). New Latrodectus malware attacks use Microsoft, Cloudflare themes. Retrieved September 13, 2024.
  3. Batista, J. (2024, June 17). Latrodectus, are you coming back?. Retrieved September 13, 2024.

Description

BPFDoor is a Linux based passive long-term backdoor used by China-based threat actors. First seen in 2021, BPFDoor is named after its usage of Berkley Packet Filter (BPF) to execute single task instructions. BPFDoor supports multiple protocols for communicating with a C2 including TCP, UDP, and ICMP and can start local or reverse shells that bypass firewalls using iptables.[1][2]

References:

  1. The Sandfly Security Team. (2022, May 11). BPFDoor - An Evasive Linux Backdoor Technical Analysis. Retrieved September 29, 2023.
  2. Shaul Vilkomir-Preisman and Eliran Nissan. (2023, May 10). BPFDoor Malware Evolves – Stealthy Sniffing Backdoor Ups Its Game. Retrieved September 19, 2024.

Description

Playcrypt is a ransomware that has been used by Play since at least 2022 in attacks against against the business, government, critical infrastructure, healthcare, and media sectors in North America, South America, and Europe. Playcrypt derives its name from adding the .play extension to encrypted files and has overlap with tactics and tools associated with Hive and Nokoyawa ransomware and infrastructure associated with Quantum ransomware.[1][2][3]

References:

  1. Microsoft Security Intelligence. (2022, August 27). Ransom:Win32/PlayCrypt.PA. Retrieved September 24, 2024.
  2. CISA. (2023, December 18). #StopRansomware: Play Ransomware AA23-352A. Retrieved September 24, 2024.
  3. Trend Micro Research. (2023, July 21). Ransomware Spotlight: Play. Retrieved September 24, 2024.

Modified Software

Description

Mimikatz is a credential dumper capable of obtaining plaintext Windows account logins and passwords, along with many other features that make it useful for testing the security of networks. [1] [2]

References:

  1. Deply, B. (n.d.). Mimikatz. Retrieved September 29, 2015.
  2. Metcalf, S. (2015, November 13). Unofficial Guide to Mimikatz & Command Reference. Retrieved December 23, 2015.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2024-02-09 21:31:30.227000+00:00 2024-09-25 20:34:58.387000+00:00

Description

Windows Credential Editor is a password dumping tool. [1]

References:

  1. Amplia Security. (n.d.). Windows Credentials Editor (WCE) F.A.Q.. Retrieved September 12, 2024.
Details
Dictionary Item Added
FIELD OLD VALUE NEW VALUE
x_mitre_deprecated False
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2020-03-30 18:28:34.296000+00:00 2024-09-12 15:17:22.004000+00:00
external_references[1]['description'] Amplia Security. (n.d.). Windows Credentials Editor (WCE) F.A.Q.. Retrieved December 17, 2015. Amplia Security. (n.d.). Windows Credentials Editor (WCE) F.A.Q.. Retrieved September 12, 2024.
external_references[1]['url'] http://www.ampliasecurity.com/research/wcefaq.html https://web.archive.org/web/20240904163410/https://www.ampliasecurity.com/research/wcefaq.html
x_mitre_attack_spec_version 2.1.0 3.2.0

Description

PoisonIvy is a popular remote access tool (RAT) that has been used by many groups.[1][2][3]

References:

  1. FireEye. (2014). POISON IVY: Assessing Damage and Extracting Intelligence. Retrieved September 19, 2024.
  2. O'Gorman, G., and McDonald, G.. (2012, September 6). The Elderwood Project. Retrieved February 15, 2018.
  3. Hayashi, K. (2005, August 18). Backdoor.Darkmoon. Retrieved February 23, 2018.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2024-02-14 19:16:01.583000+00:00 2024-09-19 14:30:03.923000+00:00
external_references[5]['description'] FireEye. (2014). POISON IVY: Assessing Damage and Extracting Intelligence. Retrieved November 12, 2014. FireEye. (2014). POISON IVY: Assessing Damage and Extracting Intelligence. Retrieved September 19, 2024.
external_references[5]['url'] https://www.fireeye.com/content/dam/fireeye-www/global/en/current-threats/pdfs/rpt-poison-ivy.pdf https://www.mandiant.com/sites/default/files/2021-09/rpt-poison-ivy.pdf

Description

GLOOXMAIL is malware used by APT1 that mimics legitimate Jabber/XMPP traffic. [1]

References:

  1. Mandiant. (n.d.). APT1 Exposing One of China’s Cyber Espionage Units. Retrieved July 18, 2016.
Details
Dictionary Item Added
FIELD OLD VALUE NEW VALUE
x_mitre_deprecated False
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2020-03-30 16:42:52.248000+00:00 2024-08-28 14:16:00.884000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 1.1 1.2

Description

PsExec is a free Microsoft tool that can be used to execute a program on another computer. It is used by IT administrators and attackers.[1][2]

References:

  1. Russinovich, M. (2014, May 2). Windows Sysinternals PsExec v2.11. Retrieved May 13, 2015.
  2. Pilkington, M. (2012, December 17). Protecting Privileged Domain Accounts: PsExec Deep-Dive. Retrieved August 17, 2016.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2024-04-04 03:50:11+00:00 2024-09-25 20:31:21.768000+00:00
x_mitre_version 1.6 1.7

Description

gh0st RAT is a remote access tool (RAT). The source code is public and it has been used by multiple groups.[1][2][3]

References:

  1. FireEye Threat Intelligence. (2015, July 13). Demonstrating Hustle, Chinese APT Groups Quickly Use Zero-Day Vulnerability (CVE-2015-5119) Following Hacking Team Leak. Retrieved January 25, 2016.
  2. Sabo, S. (2018, February 15). Musical Chairs Playing Tetris. Retrieved February 19, 2018.
  3. Pantazopoulos, N. (2018, April 17). Decoding network data from a Gh0st RAT variant. Retrieved November 2, 2018.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2024-02-06 19:00:45.557000+00:00 2024-05-07 19:07:45.403000+00:00
x_mitre_version 3.2 3.3

Description

BLACKCOFFEE is malware that has been used by several Chinese groups since at least 2013. [1] [2]

References:

  1. FireEye Labs/FireEye Threat Intelligence. (2015, May 14). Hiding in Plain Sight: FireEye and Microsoft Expose Obfuscation Tactic. Retrieved January 22, 2016.
  2. FireEye. (2018, March 16). Suspected Chinese Cyber Espionage Group (TEMP.Periscope) Targeting U.S. Engineering and Maritime Industries. Retrieved April 11, 2018.
Details
Dictionary Item Added
FIELD OLD VALUE NEW VALUE
x_mitre_deprecated False
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2020-03-30 14:58:42.298000+00:00 2024-09-04 17:04:35.670000+00:00
external_references[2]['url'] https://www2.fireeye.com/rs/fireye/images/APT17_Report.pdf https://web.archive.org/web/20240119213200/https://www2.fireeye.com/rs/fireye/images/APT17_Report.pdf
x_mitre_attack_spec_version 2.1.0 3.2.0

Description

ASPXSpy is a Web shell. It has been modified by Threat Group-3390 actors to create the ASPXTool version. [1]

References:

  1. Dell SecureWorks Counter Threat Unit Threat Intelligence. (2015, August 5). Threat Group-3390 Targets Organizations for Cyberespionage. Retrieved August 18, 2018.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2022-09-22 20:56:06.265000+00:00 2024-05-22 19:06:12.701000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 1.2 1.3

Description

ftp is a utility commonly available with operating systems to transfer information over the File Transfer Protocol (FTP). Adversaries can use it to transfer other tools onto a system or to exfiltrate data.[1][2]

References:

  1. Microsoft. (2021, July 21). ftp. Retrieved February 25, 2022.
  2. N/A. (n.d.). ftp(1) - Linux man page. Retrieved February 25, 2022.
Details
Dictionary Item Added
FIELD OLD VALUE NEW VALUE
x_mitre_deprecated False
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2022-03-07 22:20:18.809000+00:00 2024-08-14 15:21:48.196000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 2.0 2.1

Description

Remsec is a modular backdoor that has been used by Strider and appears to have been designed primarily for espionage purposes. Many of its modules are written in Lua. [1]

References:

  1. Symantec Security Response. (2016, August 7). Strider: Cyberespionage group turns eye of Sauron on targets. Retrieved August 17, 2016.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2024-04-11 00:16:18.864000+00:00 2024-08-05 18:23:59.724000+00:00
x_mitre_version 1.3 1.4

Description

Miner-C is malware that mines victims for the Monero cryptocurrency. It has targeted FTP servers and Network Attached Storage (NAS) devices to spread. [1]

References:

  1. Cimpanu, C.. (2016, September 9). Cryptocurrency Mining Malware Discovered Targeting Seagate NAS Hard Drives. Retrieved September 12, 2024.
Details
Dictionary Item Added
FIELD OLD VALUE NEW VALUE
x_mitre_aliases ['Miner-C']
x_mitre_deprecated False
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2018-10-17 00:14:20.652000+00:00 2024-09-12 15:19:00.433000+00:00
external_references[1]['description'] Cimpanu, C.. (2016, September 9). Cryptocurrency Mining Malware Discovered Targeting Seagate NAS Hard Drives. Retrieved October 12, 2016. Cimpanu, C.. (2016, September 9). Cryptocurrency Mining Malware Discovered Targeting Seagate NAS Hard Drives. Retrieved September 12, 2024.
external_references[1]['url'] http://news.softpedia.com/news/cryptocurrency-mining-malware-discovered-targeting-seagate-nas-hard-drives-508119.shtml https://news.softpedia.com/news/cryptocurrency-mining-malware-discovered-targeting-seagate-nas-hard-drives-508119.shtml
x_mitre_attack_spec_version 2.1.0 3.2.0

Description

ChChes is a Trojan that appears to be used exclusively by menuPass. It was used to target Japanese organizations in 2016. Its lack of persistence methods suggests it may be intended as a first-stage tool. [1] [2] [3]

References:

  1. Miller-Osborn, J. and Grunzweig, J.. (2017, February 16). menuPass Returns with New Malware and New Attacks Against Japanese Academics and Organizations. Retrieved March 1, 2017.
  2. Nakamura, Y.. (2017, February 17). ChChes - Malware that Communicates with C&C Servers Using Cookie Headers. Retrieved March 1, 2017.
  3. PwC and BAE Systems. (2017, April). Operation Cloud Hopper: Technical Annex. Retrieved April 13, 2017.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2023-03-23 15:14:18.599000+00:00 2024-09-12 19:32:28.615000+00:00
external_references[4]['description'] Carr, N.. (2017, April 6). Retrieved June 29, 2017. Carr, N.. (2017, April 6). Retrieved September 12, 2024.
external_references[4]['url'] https://twitter.com/ItsReallyNick/status/850105140589633536 https://x.com/ItsReallyNick/status/850105140589633536
x_mitre_attack_spec_version 3.1.0 3.2.0

Description

RedLeaves is a malware family used by menuPass. The code overlaps with PlugX and may be based upon the open source tool Trochilus. [1] [2]

References:

  1. PwC and BAE Systems. (2017, April). Operation Cloud Hopper: Technical Annex. Retrieved April 13, 2017.
  2. FireEye iSIGHT Intelligence. (2017, April 6). APT10 (MenuPass Group): New Tools, Global Campaign Latest Manifestation of Longstanding Threat. Retrieved June 29, 2017.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2024-04-11 00:17:52.256000+00:00 2024-09-12 19:32:28.614000+00:00
external_references[3]['description'] Carr, N.. (2017, April 6). Retrieved June 29, 2017. Carr, N.. (2017, April 6). Retrieved September 12, 2024.
external_references[3]['url'] https://twitter.com/ItsReallyNick/status/850105140589633536 https://x.com/ItsReallyNick/status/850105140589633536

Description

Cobalt Strike is a commercial, full-featured, remote access tool that bills itself as “adversary simulation software designed to execute targeted attacks and emulate the post-exploitation actions of advanced threat actors”. Cobalt Strike’s interactive post-exploit capabilities cover the full range of ATT&CK tactics, all executed within a single, integrated system.[1]

In addition to its own capabilities, Cobalt Strike leverages the capabilities of other well-known tools such as Metasploit and Mimikatz.[1]

References:

  1. Strategic Cyber LLC. (2017, March 14). Cobalt Strike Manual. Retrieved May 24, 2017.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2024-04-17 22:05:58.343000+00:00 2024-09-25 20:32:57.099000+00:00
x_mitre_version 1.12 1.13

Description

Janicab is an OS X trojan that relied on a valid developer ID and oblivious users to install it. [1]

References:

  1. Thomas. (2013, July 15). New signed malware called Janicab. Retrieved July 17, 2017.
Details
Dictionary Item Added
FIELD OLD VALUE NEW VALUE
x_mitre_deprecated False
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2020-03-19 18:00:00.645000+00:00 2024-09-12 19:07:36.511000+00:00
external_references[1]['url'] http://www.thesafemac.com/new-signed-malware-called-janicab/ https://web.archive.org/web/20230331162455/https://www.thesafemac.com/new-signed-malware-called-janicab/
x_mitre_attack_spec_version 2.1.0 3.2.0

Description

FinFisher is a government-grade commercial surveillance spyware reportedly sold exclusively to government agencies for use in targeted and lawful criminal investigations. It is heavily obfuscated and uses multiple anti-analysis techniques. It has other variants including Wingbird. [1] [2] [3] [4] [5]

References:

  1. FinFisher. (n.d.). Retrieved September 12, 2024.
  2. Anthe, C. et al. (2016, December 14). Microsoft Security Intelligence Report Volume 21. Retrieved November 27, 2017.
  3. Jiang, G., et al. (2017, September 12). FireEye Uncovers CVE-2017-8759: Zero-Day Used in the Wild to Distribute FINSPY. Retrieved February 15, 2018.
  4. Kaspersky Lab's Global Research & Analysis Team. (2017, October 16). BlackOasis APT and new targeted attacks leveraging zero-day exploit. Retrieved February 15, 2018.
  5. Allievi, A.,Flori, E. (2018, March 01). FinFisher exposed: A researcher’s tale of defeating traps, tricks, and complex virtual machines. Retrieved July 9, 2018.
Details
Dictionary Item Added
FIELD OLD VALUE NEW VALUE
x_mitre_deprecated False
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2022-03-02 15:47:13.329000+00:00 2024-09-12 17:23:46.687000+00:00
external_references[3]['description'] FinFisher. (n.d.). Retrieved December 20, 2017. FinFisher. (n.d.). Retrieved September 12, 2024.
external_references[3]['url'] http://www.finfisher.com/FinFisher/index.html https://web.archive.org/web/20171222050934/http://www.finfisher.com/FinFisher/index.html
x_mitre_attack_spec_version 2.1.0 3.2.0

Description

Winexe is a lightweight, open source tool similar to PsExec designed to allow system administrators to execute commands on remote servers. [1] Winexe is unique in that it is a GNU/Linux based client. [2]

References:

  1. Skalkotos, N. (2013, September 20). WinExe. Retrieved January 22, 2018.
  2. Guarnieri, C. (2015, June 19). Digital Attack on German Parliament: Investigative Report on the Hack of the Left Party Infrastructure in Bundestag. Retrieved January 22, 2018.
Details
Dictionary Item Added
FIELD OLD VALUE NEW VALUE
x_mitre_aliases ['Winexe']
x_mitre_deprecated False
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2018-10-17 00:14:20.652000+00:00 2024-09-04 21:09:10.255000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
Iterable Item Removed
FIELD OLD VALUE NEW VALUE
external_references {'source_name': 'Winexe', 'description': '(Citation: Winexe Github Sept 2013) (Citation: Überwachung APT28 Forfiles June 2015)'}

Description

HAPPYWORK is a downloader used by APT37 to target South Korean government and financial victims in November 2016. [1]

References:

  1. FireEye. (2018, February 20). APT37 (Reaper): The Overlooked North Korean Actor. Retrieved March 1, 2018.
Details
Dictionary Item Added
FIELD OLD VALUE NEW VALUE
x_mitre_aliases ['HAPPYWORK']
x_mitre_deprecated False
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2018-10-17 00:14:20.652000+00:00 2024-09-04 20:44:43.949000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
Iterable Item Removed
FIELD OLD VALUE NEW VALUE
external_references {'source_name': 'HAPPYWORK', 'description': '(Citation: FireEye APT37 Feb 2018)'}

Description

SHUTTERSPEED is a backdoor used by APT37. [1]

References:

  1. FireEye. (2018, February 20). APT37 (Reaper): The Overlooked North Korean Actor. Retrieved March 1, 2018.
Details
Dictionary Item Added
FIELD OLD VALUE NEW VALUE
x_mitre_aliases ['SHUTTERSPEED']
x_mitre_deprecated False
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2018-10-17 00:14:20.652000+00:00 2024-09-04 21:36:27.669000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
Iterable Item Removed
FIELD OLD VALUE NEW VALUE
external_references {'source_name': 'SHUTTERSPEED', 'description': '(Citation: FireEye APT37 Feb 2018)'}

Description

WINERACK is a backdoor used by APT37. [1]

References:

  1. FireEye. (2018, February 20). APT37 (Reaper): The Overlooked North Korean Actor. Retrieved March 1, 2018.
Details
Dictionary Item Added
FIELD OLD VALUE NEW VALUE
x_mitre_aliases ['WINERACK']
x_mitre_deprecated False
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2018-10-17 00:14:20.652000+00:00 2024-09-04 21:37:24.766000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
Iterable Item Removed
FIELD OLD VALUE NEW VALUE
external_references {'source_name': 'WINERACK', 'description': '(Citation: FireEye APT37 Feb 2018)'}

Description

Gold Dragon is a Korean-language, data gathering implant that was first observed in the wild in South Korea in July 2017. Gold Dragon was used along with Brave Prince and RunningRAT in operations targeting organizations associated with the 2018 Pyeongchang Winter Olympics. [1]

References:

  1. Sherstobitoff, R., Saavedra-Morales, J. (2018, February 02). Gold Dragon Widens Olympics Malware Attacks, Gains Permanent Presence on Victims’ Systems. Retrieved June 6, 2018.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2022-04-11 21:45:35.889000+00:00 2024-05-06 20:40:17+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 1.2 1.3

Description

Koadic is a Windows post-exploitation framework and penetration testing tool that is publicly available on GitHub. Koadic has several options for staging payloads and creating implants, and performs most of its operations using Windows Script Host.[1][2][3]

References:

  1. Magius, J., et al. (2017, July 19). Koadic. Retrieved September 27, 2024.
  2. Lee, B., Falcone, R. (2018, June 06). Sofacy Group’s Parallel Attacks. Retrieved June 18, 2018.
  3. Jazi, H. (2021, February). LazyScripter: From Empire to double RAT. Retrieved November 24, 2021.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2022-04-06 19:32:33.511000+00:00 2024-09-27 18:36:30.831000+00:00
external_references[4]['description'] Magius, J., et al. (2017, July 19). Koadic. Retrieved June 18, 2018. Magius, J., et al. (2017, July 19). Koadic. Retrieved September 27, 2024.
external_references[4]['url'] https://github.com/zerosum0x0/koadic https://github.com/offsecginger/koadic
x_mitre_attack_spec_version 2.1.0 3.2.0

Description

DDKONG is a malware sample that was part of a campaign by Rancor. DDKONG was first seen used in February 2017. [1]

References:

  1. Ash, B., et al. (2018, June 26). RANCOR: Targeted Attacks in South East Asia Using PLAINTEE and DDKONG Malware Families. Retrieved July 2, 2018.
Details
Dictionary Item Added
FIELD OLD VALUE NEW VALUE
x_mitre_aliases ['DDKONG']
x_mitre_deprecated False
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2018-10-17 00:14:20.652000+00:00 2024-09-04 21:38:11.979000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
Iterable Item Removed
FIELD OLD VALUE NEW VALUE
external_references {'source_name': 'DDKONG', 'description': '(Citation: Rancor Unit42 June 2018)'}

Description

QuasarRAT is an open-source, remote access tool that has been publicly available on GitHub since at least 2014. QuasarRAT is developed in the C# language.[1][2]

References:

  1. MaxXor. (n.d.). QuasarRAT. Retrieved July 10, 2018.
  2. Meltzer, M, et al. (2018, June 07). Patchwork APT Group Targets US Think Tanks. Retrieved July 16, 2018.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2022-08-02 15:36:30.238000+00:00 2024-05-07 19:10:03.843000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 2.0 2.1

Description

NanoCore is a modular remote access tool developed in .NET that can be used to spy on victims and steal information. It has been used by threat actors since 2013.[1][2][3][4]

References:

  1. The DigiTrust Group. (2017, January 01). NanoCore Is Not Your Average RAT. Retrieved November 9, 2018.
  2. Patel, K. (2018, March 02). The NanoCore RAT Has Resurfaced From the Sewers. Retrieved September 25, 2024.
  3. Kasza, A., Halfpop, T. (2016, February 09). NanoCoreRAT Behind an Increase in Tax-Themed Phishing E-mails. Retrieved November 9, 2018.
  4. Falcone, R., et al. (2018, August 02). The Gorgon Group: Slithering Between Nation State and Cybercrime. Retrieved August 7, 2018.
Details
Dictionary Item Added
FIELD OLD VALUE NEW VALUE
x_mitre_deprecated False
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2020-03-30 17:10:28.673000+00:00 2024-09-25 15:05:04.341000+00:00
external_references[3]['description'] Patel, K. (2018, March 02). The NanoCore RAT Has Resurfaced From the Sewers. Retrieved November 9, 2018. Patel, K. (2018, March 02). The NanoCore RAT Has Resurfaced From the Sewers. Retrieved September 25, 2024.
external_references[3]['url'] https://cofense.com/nanocore-rat-resurfaced-sewers/ https://web.archive.org/web/20240522112705/https://cofense.com/blog/nanocore-rat-resurfaced-sewers/
x_mitre_attack_spec_version 2.1.0 3.2.0

Description

Micropsia is a remote access tool written in Delphi.[1][2]

References:

  1. Rascagneres, P., Mercer, W. (2017, June 19). Delphi Used To Score Against Palestine. Retrieved November 13, 2018.
  2. Tsarfaty, Y. (2018, July 25). Micropsia Malware. Retrieved November 13, 2018.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2024-04-11 00:43:46.245000+00:00 2024-10-04 11:08:25.923000+00:00
external_references[3]['url'] https://blog.radware.com/security/2018/07/micropsia-malware/ https://www.radware.com/blog/security/2018/07/micropsia-malware/

Description

Impacket is an open source collection of modules written in Python for programmatically constructing and manipulating network protocols. Impacket contains several tools for remote service execution, Kerberos manipulation, Windows credential dumping, packet sniffing, and relay attacks.[1]

References:

  1. SecureAuth. (n.d.). Retrieved January 15, 2019.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2024-03-14 17:27:34.759000+00:00 2024-10-07 19:08:53.273000+00:00
x_mitre_version 1.6 1.7

Description

Ruler is a tool to abuse Microsoft Exchange services. It is publicly available on GitHub and the tool is executed via the command line. The creators of Ruler have also released a defensive tool, NotRuler, to detect its usage.[1][2]

References:

  1. SensePost. (2016, August 18). Ruler: A tool to abuse Exchange services. Retrieved February 4, 2019.
  2. SensePost. (2017, September 21). NotRuler - The opposite of Ruler, provides blue teams with the ability to detect Ruler usage against Exchange. Retrieved February 4, 2019.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2020-06-22 21:31:54.771000+00:00 2024-10-14 22:11:30.271000+00:00
x_mitre_platforms[1] Office 365 Office Suite

Description

Nltest is a Windows command-line utility used to list domain controllers and enumerate domain trusts.[1]

References:

  1. ss64. (n.d.). NLTEST.exe - Network Location Test. Retrieved February 14, 2019.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2023-08-09 18:03:17.167000+00:00 2024-09-25 20:27:04.356000+00:00
x_mitre_attack_spec_version 3.1.0 3.2.0
x_mitre_version 1.2 1.3

Description

Empire is an open source, cross-platform remote administration and post-exploitation framework that is publicly available on GitHub. While the tool itself is primarily written in Python, the post-exploitation agents are written in pure PowerShell for Windows and Python for Linux/macOS. Empire was one of five tools singled out by a joint report on public hacking tools being widely used by adversaries.[1][2][3]

References:

  1. The Australian Cyber Security Centre (ACSC), the Canadian Centre for Cyber Security (CCCS), the New Zealand National Cyber Security Centre (NZ NCSC), CERT New Zealand, the UK National Cyber Security Centre (UK NCSC) and the US National Cybersecurity and Communications Integration Center (NCCIC). (2018, October 11). Joint report on publicly available hacking tools. Retrieved March 11, 2019.
  2. Schroeder, W., Warner, J., Nelson, M. (n.d.). Github PowerShellEmpire. Retrieved April 28, 2016.
  3. Stepanic, D. (2018, September 2). attck_empire: Generate ATT&CK Navigator layer file from PowerShell Empire agent logs. Retrieved March 11, 2019.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2023-07-27 15:44:31.364000+00:00 2024-09-25 20:32:02.152000+00:00
x_mitre_attack_spec_version 3.1.0 3.2.0
x_mitre_version 1.7 1.8

Description

RawDisk is a legitimate commercial driver from the EldoS Corporation that is used for interacting with files, disks, and partitions. The driver allows for direct modification of data on a local computer's hard drive. In some cases, the tool can enact these raw disk modifications from user-mode processes, circumventing Windows operating system security features.[1][2]

References:

  1. Edwards, M. (2007, March 14). EldoS Provides Raw Disk Access for Vista and XP. Retrieved March 26, 2019.
  2. Novetta Threat Research Group. (2016, February 24). Operation Blockbuster: Destructive Malware Report. Retrieved March 2, 2016.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2022-07-28 18:55:35.991000+00:00 2024-08-14 15:22:38.134000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 1.0 1.1

Modified Description View changes side-by-side
[Emotet](https://attack.mitre.org/software/S0367) is a modular malware variant which is primarily used as a downloader for other malware variants such as [TrickBot](https://attack.mitre.org/software/S0266) and [IcedID](https://attack.mitre.org/software/S0483). Emotet first emerged in June 2014 2014, initially targeting the financial sector, and has been primarily used expanded to target the banking sector. (Citation: multiple verticals over time.(Citation: Trend Micro Banking Malware Jan 2019)
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2023-09-29 19:44:43.868000+00:00 2024-07-09 16:04:18.570000+00:00
description [Emotet](https://attack.mitre.org/software/S0367) is a modular malware variant which is primarily used as a downloader for other malware variants such as [TrickBot](https://attack.mitre.org/software/S0266) and [IcedID](https://attack.mitre.org/software/S0483). Emotet first emerged in June 2014 and has been primarily used to target the banking sector. (Citation: Trend Micro Banking Malware Jan 2019) [Emotet](https://attack.mitre.org/software/S0367) is a modular malware variant which is primarily used as a downloader for other malware variants such as [TrickBot](https://attack.mitre.org/software/S0266) and [IcedID](https://attack.mitre.org/software/S0483). Emotet first emerged in June 2014, initially targeting the financial sector, and has expanded to multiple verticals over time.(Citation: Trend Micro Banking Malware Jan 2019)
x_mitre_version 1.5 1.6

Description

Astaroth is a Trojan and information stealer known to affect companies in Europe, Brazil, and throughout Latin America. It has been known publicly since at least late 2017. [1][2][3]

References:

  1. Salem, E. (2019, February 13). ASTAROTH MALWARE USES LEGITIMATE OS AND ANTIVIRUS PROCESSES TO STEAL PASSWORDS AND PERSONAL DATA. Retrieved April 17, 2019.
  2. Doaty, J., Garrett, P.. (2018, September 10). We’re Seeing a Resurgence of the Demonic Astaroth WMIC Trojan. Retrieved September 25, 2024.
  3. GReAT. (2020, July 14). The Tetrade: Brazilian banking malware goes global. Retrieved November 9, 2020.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2024-04-11 02:58:17.763000+00:00 2024-09-25 15:03:49.408000+00:00
external_references[2]['description'] Doaty, J., Garrett, P.. (2018, September 10). We’re Seeing a Resurgence of the Demonic Astaroth WMIC Trojan. Retrieved April 17, 2019. Doaty, J., Garrett, P.. (2018, September 10). We’re Seeing a Resurgence of the Demonic Astaroth WMIC Trojan. Retrieved September 25, 2024.
external_references[2]['url'] https://cofense.com/seeing-resurgence-demonic-astaroth-wmic-trojan/ https://web.archive.org/web/20200302071436/https://cofense.com/seeing-resurgence-demonic-astaroth-wmic-trojan/

Modified Description View changes side-by-side
[Ebury](https://attack.mitre.org/software/S0377) is an SSH OpenSSH backdoor and credential stealer targeting Linux operating systems. Attackers require root-level access, which allows them servers and container hosts developed by [Windigo](https://attack.mitre.org/groups/G0124). [Ebury](https://attack.mitre.org/software/S0377) is primarily installed through modifying shared libraries (`.so` files) executed by the legitimate OpenSSH program. First seen in 2009, [Ebury](https://attack.mitre.org/software/S0377) has been used to replace SSH binaries (ssh, sshd, ssh-add, etc) or modify maintain a shared library used by OpenSSH (libkeyutils).(Citation: botnet of servers, deploy additional malware, and steal cryptocurrency wallets, credentials, and credit card details.(Citation: ESET Ebury Feb 2014)(Citation: BleepingComputer Ebury March 2017)(Citation: ESET Ebury Oct 2017) 2017)(Citation: ESET Ebury May 2024)
Details
Dictionary Item Added
FIELD OLD VALUE NEW VALUE
x_mitre_deprecated False
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2021-04-23 22:56:14.591000+00:00 2024-09-20 21:15:51.302000+00:00
description [Ebury](https://attack.mitre.org/software/S0377) is an SSH backdoor targeting Linux operating systems. Attackers require root-level access, which allows them to replace SSH binaries (ssh, sshd, ssh-add, etc) or modify a shared library used by OpenSSH (libkeyutils).(Citation: ESET Ebury Feb 2014)(Citation: BleepingComputer Ebury March 2017)(Citation: ESET Ebury Oct 2017) [Ebury](https://attack.mitre.org/software/S0377) is an OpenSSH backdoor and credential stealer targeting Linux servers and container hosts developed by [Windigo](https://attack.mitre.org/groups/G0124). [Ebury](https://attack.mitre.org/software/S0377) is primarily installed through modifying shared libraries (`.so` files) executed by the legitimate OpenSSH program. First seen in 2009, [Ebury](https://attack.mitre.org/software/S0377) has been used to maintain a botnet of servers, deploy additional malware, and steal cryptocurrency wallets, credentials, and credit card details.(Citation: ESET Ebury Feb 2014)(Citation: BleepingComputer Ebury March 2017)(Citation: ESET Ebury Oct 2017)(Citation: ESET Ebury May 2024)
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 1.3 2.0
Iterable Item Added
FIELD OLD VALUE NEW VALUE
external_references {'source_name': 'ESET Ebury May 2024', 'description': 'Marc-Etienne M.Léveillé. (2024, May 1). Ebury is alive but unseen. Retrieved May 21, 2024.', 'url': 'https://web-assets.esetstatic.com/wls/en/papers/white-papers/ebury-is-alive-but-unseen.pdf'}

Description

Ursnif is a banking trojan and variant of the Gozi malware observed being spread through various automated exploit kits, Spearphishing Attachments, and malicious links.[1][2] Ursnif is associated primarily with data theft, but variants also include components (backdoors, spyware, file injectors, etc.) capable of a wide variety of behaviors.[3]

References:

  1. NJCCIC. (2016, September 27). Ursnif. Retrieved September 12, 2024.
  2. Proofpoint Staff. (2016, August 25). Nightmare on Tor Street: Ursnif variant Dreambot adds Tor functionality. Retrieved June 5, 2019.
  3. Caragay, R. (2015, March 26). URSNIF: The Multifaceted Malware. Retrieved June 5, 2019.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2024-04-10 22:18:21.527000+00:00 2024-09-12 19:50:37.023000+00:00
external_references[6]['description'] NJCCIC. (2016, September 27). Ursnif. Retrieved June 4, 2019. NJCCIC. (2016, September 27). Ursnif. Retrieved September 12, 2024.
external_references[6]['url'] https://www.cyber.nj.gov/threat-profiles/trojan-variants/ursnif https://www.cyber.nj.gov/threat-landscape/malware/trojans/ursnif

Description

EvilBunny is a C++ malware sample observed since 2011 that was designed to be a execution platform for Lua scripts.[1]

References:

  1. Marschalek, M.. (2014, December 16). EvilBunny: Malware Instrumented By Lua. Retrieved June 28, 2019.
Details
Dictionary Item Added
FIELD OLD VALUE NEW VALUE
x_mitre_deprecated False
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2021-04-02 00:14:13.954000+00:00 2024-08-05 18:21:34.265000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 1.2 1.3

Description

MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, insider intel, network architecture information, etc.). It can be used by a non-administrative user to search their own email, or by an Exchange administrator to search the mailboxes of every user in a domain.[1]

References:

  1. Bullock, B., . (2018, November 20). MailSniper. Retrieved October 4, 2019.
Details
Dictionary Item Added
FIELD OLD VALUE NEW VALUE
x_mitre_deprecated False
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2020-03-30 17:01:41.302000+00:00 2024-10-14 22:11:30.271000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
Iterable Item Added
FIELD OLD VALUE NEW VALUE
x_mitre_platforms Office Suite
Iterable Item Removed
FIELD OLD VALUE NEW VALUE
x_mitre_platforms Office 365
x_mitre_platforms Azure AD

Description

BabyShark is a Microsoft Visual Basic (VB) script-based malware family that is believed to be associated with several North Korean campaigns. [1]

References:

  1. Unit 42. (2019, February 22). New BabyShark Malware Targets U.S. National Security Think Tanks. Retrieved October 7, 2019.
Details
Dictionary Item Added
FIELD OLD VALUE NEW VALUE
x_mitre_deprecated False
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2021-03-12 17:26:12.324000+00:00 2024-05-06 20:38:32.432000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 1.2 2.0
Iterable Item Added
FIELD OLD VALUE NEW VALUE
external_references {'source_name': 'LATEOP', 'description': '(Citation: Mandiant APT43 March 2024)'}
external_references {'source_name': 'Mandiant APT43 March 2024', 'description': 'Mandiant. (2024, March 14). APT43: North Korean Group Uses Cybercrime to Fund Espionage Operations. Retrieved May 3, 2024.', 'url': 'https://services.google.com/fh/files/misc/apt43-report-en.pdf'}
x_mitre_aliases LATEOP

Description

PoetRAT is a remote access trojan (RAT) that was first identified in April 2020. PoetRAT has been used in multiple campaigns against the private and public sectors in Azerbaijan, including ICS and SCADA systems in the energy sector. The STIBNITE activity group has been observed using the malware. PoetRAT derived its name from references in the code to poet William Shakespeare. [1][2][3]

References:

  1. Mercer, W, et al. (2020, April 16). PoetRAT: Python RAT uses COVID-19 lures to target Azerbaijan public and private sectors. Retrieved April 27, 2020.
  2. Mercer, W. Rascagneres, P. Ventura, V. (2020, October 6). PoetRAT: Malware targeting public and private sector in Azerbaijan evolves . Retrieved April 9, 2021.
  3. Dragos. (n.d.). ICS Cybersecurity Year in Review 2020. Retrieved February 25, 2021.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2023-03-22 05:09:38.370000+00:00 2024-08-05 18:24:31.652000+00:00
x_mitre_attack_spec_version 3.1.0 3.2.0
x_mitre_version 2.2 2.3

Description

IcedID is a modular banking malware designed to steal financial information that has been observed in the wild since at least 2017. IcedID has been downloaded by Emotet in multiple campaigns.[1][2]

References:

  1. Kessem, L., et al. (2017, November 13). New Banking Trojan IcedID Discovered by IBM X-Force Research. Retrieved July 14, 2020.
  2. Kimayong, P. (2020, June 18). COVID-19 and FMLA Campaigns used to install new IcedID banking malware. Retrieved July 14, 2020.
Details
Dictionary Item Added
FIELD OLD VALUE NEW VALUE
x_mitre_contributors ['Jorge Orchilles', 'Matt Brenton', 'Zaw Min Htun, @Z3TAE']
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2024-04-11 02:16:08.503000+00:00 2024-10-28 19:20:20.633000+00:00
x_mitre_version 1.1 1.2

Description

BloodHound is an Active Directory (AD) reconnaissance tool that can reveal hidden relationships and identify attack paths within an AD environment.[1][2][3]

References:

  1. Robbins, A., Vazarkar, R., and Schroeder, W. (2016, April 17). Bloodhound: Six Degrees of Domain Admin. Retrieved March 5, 2019.
  2. Red Team Labs. (2018, April 24). Hidden Administrative Accounts: BloodHound to the Rescue. Retrieved October 28, 2020.
  3. Dantzig, M. v., Schamper, E. (2019, December 19). Operation Wocao: Shining a light on one of China’s hidden hacking groups. Retrieved October 8, 2020.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2023-08-09 18:00:13.178000+00:00 2024-09-25 20:33:37.892000+00:00
x_mitre_attack_spec_version 3.1.0 3.2.0
x_mitre_version 1.5 1.6

Description

SLOTHFULMEDIA is a remote access Trojan written in C++ that has been used by an unidentified "sophisticated cyber actor" since at least January 2017.[1][2] It has been used to target government organizations, defense contractors, universities, and energy companies in Russia, India, Kazakhstan, Kyrgyzstan, Malaysia, Ukraine, and Eastern Europe.[3][4]

In October 2020, Kaspersky Labs assessed SLOTHFULMEDIA is part of an activity cluster it refers to as "IAmTheKing".[4] ESET also noted code similarity between SLOTHFULMEDIA and droppers used by a group it refers to as "PowerPool".[5]

References:

  1. DHS/CISA, Cyber National Mission Force. (2020, October 1). Malware Analysis Report (MAR) MAR-10303705-1.v1 – Remote Access Trojan: SLOTHFULMEDIA. Retrieved October 2, 2020.
  2. Costin Raiu. (2020, October 2). Costin Raiu Twitter IAmTheKing SlothfulMedia. Retrieved September 12, 2024.
  3. USCYBERCOM. (2020, October 1). USCYBERCOM Cybersecurity Alert SLOTHFULMEDIA. Retrieved September 12, 2024.
  4. Ivan Kwiatkowski, Pierre Delcher, Felix Aime. (2020, October 15). IAmTheKing and the SlothfulMedia malware family. Retrieved October 15, 2020.
  5. ESET Research. (2020, October 1). ESET Research Tweet Linking Slothfulmedia and PowerPool. Retrieved September 12, 2024.
Details
Dictionary Item Added
FIELD OLD VALUE NEW VALUE
x_mitre_deprecated False
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2021-04-13 20:44:14.476000+00:00 2024-09-12 19:39:44.514000+00:00
external_references[4]['description'] Costin Raiu. (2020, October 2). Costin Raiu Twitter IAmTheKing SlothfulMedia. Retrieved November 16, 2020. Costin Raiu. (2020, October 2). Costin Raiu Twitter IAmTheKing SlothfulMedia. Retrieved September 12, 2024.
external_references[4]['url'] https://twitter.com/craiu/status/1311920398259367942 https://x.com/craiu/status/1311920398259367942
external_references[7]['description'] ESET Research. (2020, October 1). ESET Research Tweet Linking Slothfulmedia and PowerPool. Retrieved November 17, 2020. ESET Research. (2020, October 1). ESET Research Tweet Linking Slothfulmedia and PowerPool. Retrieved September 12, 2024.
external_references[7]['url'] https://twitter.com/ESETresearch/status/1311762215490461696 https://x.com/ESETresearch/status/1311762215490461696
external_references[5]['description'] USCYBERCOM. (2020, October 1). USCYBERCOM Cybersecurity Alert SLOTHFULMEDIA. Retrieved November 16, 2020. USCYBERCOM. (2020, October 1). USCYBERCOM Cybersecurity Alert SLOTHFULMEDIA. Retrieved September 12, 2024.
external_references[5]['url'] https://twitter.com/CNMF_CyberAlert/status/1311743710997159953 https://x.com/CNMF_CyberAlert/status/1311743710997159953
x_mitre_attack_spec_version 2.1.0 3.2.0

Description

GrimAgent is a backdoor that has been used before the deployment of Ryuk ransomware since at least 2020; it is likely used by FIN6 and Wizard Spider.[1]

References:

  1. Priego, A. (2021, July). THE BROTHERS GRIM: THE REVERSING TALE OF GRIMAGENT MALWARE USED BY RYUK. Retrieved September 19, 2024.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2022-07-29 19:44:21.016000+00:00 2024-09-19 14:32:39.426000+00:00
external_references[1]['description'] Priego, A. (2021, July). THE BROTHERS GRIM: THE REVERSING TALE OF GRIMAGENT MALWARE USED BY RYUK. Retrieved July 16, 2021. Priego, A. (2021, July). THE BROTHERS GRIM: THE REVERSING TALE OF GRIMAGENT MALWARE USED BY RYUK. Retrieved September 19, 2024.
external_references[1]['url'] https://gibnc.group-ib.com/s/Group-IB_GrimAgent_analysis#pdfviewer https://www.group-ib.com/blog/grimagent/
x_mitre_attack_spec_version 2.1.0 3.2.0

Description

Wevtutil is a Windows command-line utility that enables administrators to retrieve information about event logs and publishers.[1]

References:

  1. Microsoft. (n.d.). wevtutil. Retrieved September 14, 2021.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2022-10-13 17:45:16.377000+00:00 2024-09-25 20:32:25.006000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 1.1 1.2

Description

QakBot is a modular banking trojan that has been used primarily by financially-motivated actors since at least 2007. QakBot is continuously maintained and developed and has evolved from an information stealer into a delivery agent for ransomware, most notably ProLock and Egregor.[1][2][3][4]

References:

  1. Trend Micro. (2020, December 17). QAKBOT: A decade-old malware still with new tricks. Retrieved September 27, 2021.
  2. Rainey, K. (n.d.). Qbot. Retrieved September 27, 2021.
  3. Kuzmenko, A. et al. (2021, September 2). QakBot technical analysis. Retrieved September 27, 2021.
  4. Morrow, D. (2021, April 15). The rise of QakBot. Retrieved September 27, 2021.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2023-12-05 20:22:37.368000+00:00 2024-09-17 16:10:03.901000+00:00
x_mitre_version 1.2 1.3

Description

DarkWatchman is a lightweight JavaScript-based remote access tool (RAT) that avoids file operations; it was first observed in November 2021.[1]

References:

  1. Smith, S., Stafford, M. (2021, December 14). DarkWatchman: A new evolution in fileless techniques. Retrieved January 10, 2022.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2024-04-11 02:40:18.361000+00:00 2024-08-26 16:28:39.922000+00:00
external_references[1]['url'] https://www.prevailion.com/darkwatchman-new-fileless-techniques/ https://web.archive.org/web/20220629230035/https://www.prevailion.com/darkwatchman-new-fileless-techniques/

Description

AADInternals is a PowerShell-based framework for administering, enumerating, and exploiting Azure Active Directory. The tool is publicly available on GitHub.[1][2]

References:

  1. Dr. Nestori Syynimaa. (2021, December 13). AADInternals. Retrieved February 1, 2022.
  2. Dr. Nestori Syynimaa. (2018, October 25). AADInternals. Retrieved February 18, 2022.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2023-04-15 00:59:18.335000+00:00 2024-10-14 22:11:30.271000+00:00
x_mitre_platforms[1] Azure AD Office Suite
x_mitre_platforms[2] Office 365 Identity Provider

Description

ROADTools is a framework for enumerating Azure Active Directory environments. The tool is written in Python and publicly available on GitHub.[1]

References:

  1. Dirk-jan Mollema. (2022, January 31). ROADtools. Retrieved January 31, 2022.
Details
Dictionary Item Added
FIELD OLD VALUE NEW VALUE
x_mitre_deprecated False
x_mitre_platforms ['Identity Provider']
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2022-04-01 13:27:48.378000+00:00 2024-09-16 17:02:37.377000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0

Modified Description View changes side-by-side
[Cyclops Blink](https://attack.mitre.org/software/S0687) is a modular malware that has been used in widespread campaigns by [Sandworm Team](https://attack.mitre.org/groups/G0034) since at least 2019 to target Small/Home Office (SOHO) network devices, including WatchGuard and Asus.(Citation: Asus. [Cyclops Blink](https://attack.mitre.org/software/S0687) is assessed to be a replacement for [VPNFilter](https://attack.mitre.org/software/S1010), a similar platform targeting network devices.(Citation: NCSC Cyclops Blink February 2022)(Citation: NCSC CISA Cyclops Blink Advisory February 2022)(Citation: Trend Micro Cyclops Blink March 2022)
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2022-04-14 17:00:26.886000+00:00 2024-08-15 22:36:30.074000+00:00
description [Cyclops Blink](https://attack.mitre.org/software/S0687) is a modular malware that has been used in widespread campaigns by [Sandworm Team](https://attack.mitre.org/groups/G0034) since at least 2019 to target Small/Home Office (SOHO) network devices, including WatchGuard and Asus.(Citation: NCSC Cyclops Blink February 2022)(Citation: NCSC CISA Cyclops Blink Advisory February 2022)(Citation: Trend Micro Cyclops Blink March 2022) [Cyclops Blink](https://attack.mitre.org/software/S0687) is a modular malware that has been used in widespread campaigns by [Sandworm Team](https://attack.mitre.org/groups/G0034) since at least 2019 to target Small/Home Office (SOHO) network devices, including WatchGuard and Asus. [Cyclops Blink](https://attack.mitre.org/software/S0687) is assessed to be a replacement for [VPNFilter](https://attack.mitre.org/software/S1010), a similar platform targeting network devices.(Citation: NCSC Cyclops Blink February 2022)(Citation: NCSC CISA Cyclops Blink Advisory February 2022)(Citation: Trend Micro Cyclops Blink March 2022)
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 1.0 1.1

Description

SILENTTRINITY is an open source remote administration and post-exploitation framework primarily written in Python that includes stagers written in Powershell, C, and Boo. SILENTTRINITY was used in a 2019 campaign against Croatian government agencies by unidentified cyber actors.[1][2]

References:

  1. Salvati, M (2019, August 6). SILENTTRINITY. Retrieved March 23, 2022.
  2. Paganini, P. (2019, July 7). Croatia government agencies targeted with news SilentTrinity malware. Retrieved March 23, 2022.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2023-04-14 19:27:39.308000+00:00 2024-09-23 14:18:53.140000+00:00
x_mitre_attack_spec_version 3.1.0 3.2.0
x_mitre_version 1.0 1.1
x_mitre_contributors[0] Daniel Acevedo, @darmad0, ARMADO Daniel Acevedo, Blackbot

Description

Flagpro is a Windows-based, first-stage downloader that has been used by BlackTech since at least October 2020. It has primarily been used against defense, media, and communications companies in Japan.[1]

References:

  1. Hada, H. (2021, December 28). Flagpro The new malware used by BlackTech. Retrieved March 25, 2022.
Details
Dictionary Item Added
FIELD OLD VALUE NEW VALUE
x_mitre_deprecated False
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2022-04-01 14:41:47.579000+00:00 2024-09-04 21:39:21.144000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
Iterable Item Removed
FIELD OLD VALUE NEW VALUE
external_references {'source_name': 'Flagpro ', 'description': '(Citation: NTT Security Flagpro new December 2021)'}

Modified Description View changes side-by-side
[MacMa](https://attack.mitre.org/software/S1016) is a macOS-based backdoor with a large set of functionalities to control and exfiltrate files from a compromised computer. [MacMa](https://attack.mitre.org/software/S1016) has been observed in the wild since November 2021.(Citation: ESET DazzleSpy Jan 2022) [MacMa](https://attack.mitre.org/software/S1016) shares command and control and unique libraries with [MgBot](https://attack.mitre.org/software/S1146) and [Nightdoor](https://attack.mitre.org/software/S1147), indicating a relationship with the [Daggerfly](https://attack.mitre.org/groups/G1034) threat actor.(Citation: Symantec Daggerfly 2024)
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2022-10-24 18:52:29.002000+00:00 2024-07-26 17:48:10.580000+00:00
description [MacMa](https://attack.mitre.org/software/S1016) is a macOS-based backdoor with a large set of functionalities to control and exfiltrate files from a compromised computer. [MacMa](https://attack.mitre.org/software/S1016) has been observed in the wild since November 2021.(Citation: ESET DazzleSpy Jan 2022) [MacMa](https://attack.mitre.org/software/S1016) is a macOS-based backdoor with a large set of functionalities to control and exfiltrate files from a compromised computer. [MacMa](https://attack.mitre.org/software/S1016) has been observed in the wild since November 2021.(Citation: ESET DazzleSpy Jan 2022) [MacMa](https://attack.mitre.org/software/S1016) shares command and control and unique libraries with [MgBot](https://attack.mitre.org/software/S1146) and [Nightdoor](https://attack.mitre.org/software/S1147), indicating a relationship with the [Daggerfly](https://attack.mitre.org/groups/G1034) threat actor.(Citation: Symantec Daggerfly 2024)
x_mitre_attack_spec_version 3.0.0 3.2.0
x_mitre_version 1.0 2.0
Iterable Item Added
FIELD OLD VALUE NEW VALUE
external_references {'source_name': 'Symantec Daggerfly 2024', 'description': 'Threat Hunter Team. (2024, July 23). Daggerfly: Espionage Group Makes Major Update to Toolset. Retrieved July 25, 2024.', 'url': 'https://symantec-enterprise-blogs.security.com/threat-intelligence/daggerfly-espionage-updated-toolset'}

Modified Description View changes side-by-side
[OutSteel](https://attack.mitre.org/software/S1017) is a file uploader and document stealer developed with the scripting language AutoIT that has been used by [Ember Bear](https://attack.mitre.org/groups/G1003) [Saint Bear](https://attack.mitre.org/groups/G1031) since at least March 2021.(Citation: Palo Alto Unit 42 OutSteel SaintBot February 2022 )
Details
Dictionary Item Added
FIELD OLD VALUE NEW VALUE
x_mitre_aliases ['OutSteel']
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2022-06-09 18:53:30.145000+00:00 2024-10-08 20:11:00.316000+00:00
description [OutSteel](https://attack.mitre.org/software/S1017) is a file uploader and document stealer developed with the scripting language AutoIT that has been used by [Ember Bear](https://attack.mitre.org/groups/G1003) since at least March 2021.(Citation: Palo Alto Unit 42 OutSteel SaintBot February 2022 ) [OutSteel](https://attack.mitre.org/software/S1017) is a file uploader and document stealer developed with the scripting language AutoIT that has been used by [Saint Bear](https://attack.mitre.org/groups/G1031) since at least March 2021.(Citation: Palo Alto Unit 42 OutSteel SaintBot February 2022 )
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 1.0 2.0

Modified Description View changes side-by-side
[Saint Bot](https://attack.mitre.org/software/S1018) is a .NET downloader that has been used by [Ember Bear](https://attack.mitre.org/groups/G1003) [Saint Bear](https://attack.mitre.org/groups/G1031) since at least March 2021.(Citation: Malwarebytes Saint Bot April 2021)(Citation: Palo Alto Unit 42 OutSteel SaintBot February 2022 )
Details
Dictionary Item Added
FIELD OLD VALUE NEW VALUE
x_mitre_aliases ['Saint Bot']
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2022-06-09 19:56:56.809000+00:00 2024-10-08 20:10:44.570000+00:00
description [Saint Bot](https://attack.mitre.org/software/S1018) is a .NET downloader that has been used by [Ember Bear](https://attack.mitre.org/groups/G1003) since at least March 2021.(Citation: Malwarebytes Saint Bot April 2021)(Citation: Palo Alto Unit 42 OutSteel SaintBot February 2022 ) [Saint Bot](https://attack.mitre.org/software/S1018) is a .NET downloader that has been used by [Saint Bear](https://attack.mitre.org/groups/G1031) since at least March 2021.(Citation: Malwarebytes Saint Bot April 2021)(Citation: Palo Alto Unit 42 OutSteel SaintBot February 2022 )
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 1.0 2.0

Description

CreepyDrive is a custom implant has been used by POLONIUM since at least early 2022 for C2 with and exfiltration to actor-controlled OneDrive accounts.[1]

POLONIUM has used a similar implant called CreepyBox that relies on actor-controlled DropBox accounts.[1]

References:

  1. Microsoft. (2022, June 2). Exposing POLONIUM activity and infrastructure targeting Israeli organizations. Retrieved July 1, 2022.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2022-08-10 13:07:11.790000+00:00 2024-10-14 22:11:30.271000+00:00
x_mitre_platforms[1] Office 365 Office Suite

Description

Amadey is a Trojan bot that has been used since at least October 2018.[1][2]

References:

  1. Financial Security Institute. (2020, February 28). Profiling of TA505 Threat Group That Continues to Attack the Financial Sector. Retrieved July 14, 2022.
  2. Kasuya, M. (2020, January 8). Threat Spotlight: Amadey Bot Targets Non-Russian Users. Retrieved July 14, 2022.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2022-10-14 21:33:47.608000+00:00 2024-05-07 19:11:33.669000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 1.0 1.1

Description

Bumblebee is a custom loader written in C++ that has been used by multiple threat actors, including possible initial access brokers, to download and execute additional payloads since at least March 2022. Bumblebee has been linked to ransomware operations including Conti, Quantum, and Mountlocker and derived its name from the appearance of "bumblebee" in the user-agent.[1][2][3]

References:

  1. Stolyarov, V. (2022, March 17). Exposing initial access broker with ties to Conti. Retrieved August 18, 2022.
  2. Merriman, K. and Trouerbach, P. (2022, April 28). This isn't Optimus Prime's Bumblebee but it's Still Transforming. Retrieved August 22, 2022.
  3. Kamble, V. (2022, June 28). Bumblebee: New Loader Rapidly Assuming Central Position in Cyber-crime Ecosystem. Retrieved August 24, 2022.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2022-10-21 21:43:41.253000+00:00 2024-09-17 17:58:55.921000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 1.0 1.1

Description

Brute Ratel C4 is a commercial red-teaming and adversarial attack simulation tool that first appeared in December 2020. Brute Ratel C4 was specifically designed to avoid detection by endpoint detection and response (EDR) and antivirus (AV) capabilities, and deploys agents called badgers to enable arbitrary command execution for lateral movement, privilege escalation, and persistence. In September 2022, a cracked version of Brute Ratel C4 was leaked in the cybercriminal underground, leading to its use by threat actors.[1][2][3][4][5]

References:

  1. Dark Vortex. (n.d.). A Customized Command and Control Center for Red Team and Adversary Simulation. Retrieved February 7, 2023.
  2. Harbison, M. and Renals, P. (2022, July 5). When Pentest Tools Go Brutal: Red-Teaming Tool Being Abused by Malicious Actors. Retrieved February 1, 2023.
  3. Chell, D. PART 3: How I Met Your Beacon – Brute Ratel. Retrieved February 6, 2023.
  4. Thomas, W. (2022, October 5). Cracked Brute Ratel C4 framework proliferates across the cybercriminal underground. Retrieved February 6, 2023.
  5. Kenefick, I. et al. (2022, October 12). Black Basta Ransomware Gang Infiltrates Networks via QAKBOT, Brute Ratel, and Cobalt Strike. Retrieved February 6, 2023.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2023-04-17 21:44:03.462000+00:00 2024-09-19 15:46:58.008000+00:00
x_mitre_attack_spec_version 3.1.0 3.2.0
x_mitre_version 1.0 1.1

Description

DarkGate first emerged in 2018 and has evolved into an initial access and data gathering tool associated with various criminal cyber operations. Written in Delphi and named "DarkGate" by its author, DarkGate is associated with credential theft, cryptomining, cryptotheft, and pre-ransomware actions.[1] DarkGate use increased significantly starting in 2022 and is under active development by its author, who provides it as a Malware-as-a-Service offering.[2]

References:

  1. Adi Zeligson & Rotem Kerner. (2018, November 13). Enter The DarkGate - New Cryptocurrency Mining and Ransomware Campaign. Retrieved February 9, 2024.
  2. Ernesto Fernández Provecho, Pham Duy Phuc, Ciana Driscoll & Vinoo Thomas. (2023, November 21). The Continued Evolution of the DarkGate Malware-as-a-Service. Retrieved February 9, 2024.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2024-04-01 21:19:06.580000+00:00 2024-09-29 10:22:45.776000+00:00
Iterable Item Added
FIELD OLD VALUE NEW VALUE
x_mitre_contributors Phyo Paing Htun (ChiLai)