software_id
stringclasses 826
values | software
stringclasses 826
values | technique_id
stringclasses 597
values | technique_name
stringclasses 602
values | technique_use
stringlengths 23
663
| description
stringclasses 826
values | url
stringclasses 826
values |
---|---|---|---|---|---|---|
S1081 | BADHATCH | T1057 | Process Discovery | BADHATCH can retrieve a list of running processes from a compromised machine. | BADHATCH is a backdoor that has been utilized by FIN8 since at least 2019. BADHATCH has been used to target the insurance, retail, technology, and chemical industries in the United States, Canada, South Africa, Panama, and Italy. | https://attack.mitre.org/software/S1081 |
S1081 | BADHATCH | T1055 | Process Injection | BADHATCH can inject itself into an existing explorer.exe process by using RtlCreateUserThread. | BADHATCH is a backdoor that has been utilized by FIN8 since at least 2019. BADHATCH has been used to target the insurance, retail, technology, and chemical industries in the United States, Canada, South Africa, Panama, and Italy. | https://attack.mitre.org/software/S1081 |
S1081 | BADHATCH | .001 | Dynamic-link Library Injection | BADHATCH has the ability to execute a malicious DLL by injecting into explorer.exe on a compromised machine. | BADHATCH is a backdoor that has been utilized by FIN8 since at least 2019. BADHATCH has been used to target the insurance, retail, technology, and chemical industries in the United States, Canada, South Africa, Panama, and Italy. | https://attack.mitre.org/software/S1081 |
S1081 | BADHATCH | .004 | Asynchronous Procedure Call | BADHATCH can inject itself into a new svchost.exe -k netsvcs process using the asynchronous procedure call (APC) queue. | BADHATCH is a backdoor that has been utilized by FIN8 since at least 2019. BADHATCH has been used to target the insurance, retail, technology, and chemical industries in the United States, Canada, South Africa, Panama, and Italy. | https://attack.mitre.org/software/S1081 |
S1081 | BADHATCH | T1090 | Proxy | BADHATCH can use SOCKS4 and SOCKS5 proxies to connect to actor-controlled C2 servers. BADHATCH can also emulate a reverse proxy on a compromised machine to connect with actor-controlled C2 servers. | BADHATCH is a backdoor that has been utilized by FIN8 since at least 2019. BADHATCH has been used to target the insurance, retail, technology, and chemical industries in the United States, Canada, South Africa, Panama, and Italy. | https://attack.mitre.org/software/S1081 |
S1081 | BADHATCH | T1620 | Reflective Code Loading | BADHATCH can copy a large byte array of 64-bit shellcode into process memory and execute it with a call to CreateThread. | BADHATCH is a backdoor that has been utilized by FIN8 since at least 2019. BADHATCH has been used to target the insurance, retail, technology, and chemical industries in the United States, Canada, South Africa, Panama, and Italy. | https://attack.mitre.org/software/S1081 |
S1081 | BADHATCH | T1018 | Remote System Discovery | BADHATCH can use a PowerShell object such as, System.Net.NetworkInformation.Ping to ping a computer. | BADHATCH is a backdoor that has been utilized by FIN8 since at least 2019. BADHATCH has been used to target the insurance, retail, technology, and chemical industries in the United States, Canada, South Africa, Panama, and Italy. | https://attack.mitre.org/software/S1081 |
S1081 | BADHATCH | T1053.005 | Scheduled Task/Job: Scheduled Task | BADHATCH can use schtasks.exe to gain persistence. | BADHATCH is a backdoor that has been utilized by FIN8 since at least 2019. BADHATCH has been used to target the insurance, retail, technology, and chemical industries in the United States, Canada, South Africa, Panama, and Italy. | https://attack.mitre.org/software/S1081 |
S1081 | BADHATCH | T1113 | Screen Capture | BADHATCH can take screenshots and send them to an actor-controlled C2 server. | BADHATCH is a backdoor that has been utilized by FIN8 since at least 2019. BADHATCH has been used to target the insurance, retail, technology, and chemical industries in the United States, Canada, South Africa, Panama, and Italy. | https://attack.mitre.org/software/S1081 |
S1081 | BADHATCH | T1082 | System Information Discovery | BADHATCH can obtain current system information from a compromised machine such as the SHELL PID, PSVERSION, HOSTNAME, LOGONSERVER, LASTBOOTUP, drive information, OS type/version, bitness, and hostname. | BADHATCH is a backdoor that has been utilized by FIN8 since at least 2019. BADHATCH has been used to target the insurance, retail, technology, and chemical industries in the United States, Canada, South Africa, Panama, and Italy. | https://attack.mitre.org/software/S1081 |
S1081 | BADHATCH | T1049 | System Network Connections Discovery | BADHATCH can execute netstat.exe -f on a compromised machine. | BADHATCH is a backdoor that has been utilized by FIN8 since at least 2019. BADHATCH has been used to target the insurance, retail, technology, and chemical industries in the United States, Canada, South Africa, Panama, and Italy. | https://attack.mitre.org/software/S1081 |
S1081 | BADHATCH | T1033 | System Owner/User Discovery | BADHATCH can obtain logged user information from a compromised machine and can execute the command whoami.exe. | BADHATCH is a backdoor that has been utilized by FIN8 since at least 2019. BADHATCH has been used to target the insurance, retail, technology, and chemical industries in the United States, Canada, South Africa, Panama, and Italy. | https://attack.mitre.org/software/S1081 |
S1081 | BADHATCH | T1124 | System Time Discovery | BADHATCH can obtain the DATETIME and UPTIME from a compromised machine. | BADHATCH is a backdoor that has been utilized by FIN8 since at least 2019. BADHATCH has been used to target the insurance, retail, technology, and chemical industries in the United States, Canada, South Africa, Panama, and Italy. | https://attack.mitre.org/software/S1081 |
S1081 | BADHATCH | T1550.002 | Use Alternate Authentication Material: Pass the Hash | BADHATCH can perform pass the hash on compromised machines with x64 versions. | BADHATCH is a backdoor that has been utilized by FIN8 since at least 2019. BADHATCH has been used to target the insurance, retail, technology, and chemical industries in the United States, Canada, South Africa, Panama, and Italy. | https://attack.mitre.org/software/S1081 |
S1081 | BADHATCH | T1102 | Web Service | BADHATCH can be utilized to abuse sslip.io, a free IP to domain mapping service, as part of actor-controlled C2 channels. | BADHATCH is a backdoor that has been utilized by FIN8 since at least 2019. BADHATCH has been used to target the insurance, retail, technology, and chemical industries in the United States, Canada, South Africa, Panama, and Italy. | https://attack.mitre.org/software/S1081 |
S1081 | BADHATCH | T1047 | Windows Management Instrumentation | BADHATCH can utilize WMI to collect system information, create new processes, and run malicious PowerShell scripts on a compromised machine. | BADHATCH is a backdoor that has been utilized by FIN8 since at least 2019. BADHATCH has been used to target the insurance, retail, technology, and chemical industries in the United States, Canada, South Africa, Panama, and Italy. | https://attack.mitre.org/software/S1081 |
S0128 | BADNEWS | T1071.001 | Application Layer Protocol: Web Protocols | BADNEWS establishes a backdoor over HTTP. | BADNEWS is malware that has been used by the actors responsible for the Patchwork campaign. Its name was given due to its use of RSS feeds, forums, and blogs for command and control. | https://attack.mitre.org/software/S0128 |
S0128 | BADNEWS | T1119 | Automated Collection | BADNEWS monitors USB devices and copies files with certain extensions to a predefined directory. | BADNEWS is malware that has been used by the actors responsible for the Patchwork campaign. Its name was given due to its use of RSS feeds, forums, and blogs for command and control. | https://attack.mitre.org/software/S0128 |
S0128 | BADNEWS | T1547.001 | Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder | BADNEWS installs a registry Run key to establish persistence. | BADNEWS is malware that has been used by the actors responsible for the Patchwork campaign. Its name was given due to its use of RSS feeds, forums, and blogs for command and control. | https://attack.mitre.org/software/S0128 |
S0128 | BADNEWS | T1059.003 | Command and Scripting Interpreter: Windows Command Shell | BADNEWS is capable of executing commands via cmd.exe. | BADNEWS is malware that has been used by the actors responsible for the Patchwork campaign. Its name was given due to its use of RSS feeds, forums, and blogs for command and control. | https://attack.mitre.org/software/S0128 |
S0128 | BADNEWS | T1132 | Data Encoding | After encrypting C2 data, BADNEWS converts it into a hexadecimal representation and then encodes it into base64. | BADNEWS is malware that has been used by the actors responsible for the Patchwork campaign. Its name was given due to its use of RSS feeds, forums, and blogs for command and control. | https://attack.mitre.org/software/S0128 |
S0128 | BADNEWS | .001 | Standard Encoding | BADNEWS encodes C2 traffic with base64. | BADNEWS is malware that has been used by the actors responsible for the Patchwork campaign. Its name was given due to its use of RSS feeds, forums, and blogs for command and control. | https://attack.mitre.org/software/S0128 |
S0128 | BADNEWS | T1005 | Data from Local System | When it first starts, BADNEWS crawls the victim's local drives and collects documents with the following extensions: .doc, .docx, .pdf, .ppt, .pptx, and .txt. | BADNEWS is malware that has been used by the actors responsible for the Patchwork campaign. Its name was given due to its use of RSS feeds, forums, and blogs for command and control. | https://attack.mitre.org/software/S0128 |
S0128 | BADNEWS | T1039 | Data from Network Shared Drive | When it first starts, BADNEWS crawls the victim's mapped drives and collects documents with the following extensions: .doc, .docx, .pdf, .ppt, .pptx, and .txt. | BADNEWS is malware that has been used by the actors responsible for the Patchwork campaign. Its name was given due to its use of RSS feeds, forums, and blogs for command and control. | https://attack.mitre.org/software/S0128 |
S0128 | BADNEWS | T1025 | Data from Removable Media | BADNEWS copies files with certain extensions from USB devices toa predefined directory. | BADNEWS is malware that has been used by the actors responsible for the Patchwork campaign. Its name was given due to its use of RSS feeds, forums, and blogs for command and control. | https://attack.mitre.org/software/S0128 |
S0128 | BADNEWS | T1074.001 | Data Staged: Local Data Staging | BADNEWS copies documents under 15MB found on the victim system to is the user's %temp%\SMB\ folder. It also copies files from USB devices to a predefined directory. | BADNEWS is malware that has been used by the actors responsible for the Patchwork campaign. Its name was given due to its use of RSS feeds, forums, and blogs for command and control. | https://attack.mitre.org/software/S0128 |
S0128 | BADNEWS | T1573.001 | Encrypted Channel: Symmetric Cryptography | BADNEWS encrypts C2 data with a ROR by 3 and an XOR by 0x23. | BADNEWS is malware that has been used by the actors responsible for the Patchwork campaign. Its name was given due to its use of RSS feeds, forums, and blogs for command and control. | https://attack.mitre.org/software/S0128 |
S0128 | BADNEWS | T1083 | File and Directory Discovery | BADNEWS identifies files with certain extensions from USB devices, then copies them to a predefined directory. | BADNEWS is malware that has been used by the actors responsible for the Patchwork campaign. Its name was given due to its use of RSS feeds, forums, and blogs for command and control. | https://attack.mitre.org/software/S0128 |
S0128 | BADNEWS | T1574.002 | Hijack Execution Flow: DLL Side-Loading | BADNEWS typically loads its DLL file into a legitimate signed Java or VMware executable. | BADNEWS is malware that has been used by the actors responsible for the Patchwork campaign. Its name was given due to its use of RSS feeds, forums, and blogs for command and control. | https://attack.mitre.org/software/S0128 |
S0128 | BADNEWS | T1105 | Ingress Tool Transfer | BADNEWS is capable of downloading additional files through C2 channels, including a new version of itself. | BADNEWS is malware that has been used by the actors responsible for the Patchwork campaign. Its name was given due to its use of RSS feeds, forums, and blogs for command and control. | https://attack.mitre.org/software/S0128 |
S0128 | BADNEWS | T1056.001 | Input Capture: Keylogging | When it first starts, BADNEWS spawns a new thread to log keystrokes. | BADNEWS is malware that has been used by the actors responsible for the Patchwork campaign. Its name was given due to its use of RSS feeds, forums, and blogs for command and control. | https://attack.mitre.org/software/S0128 |
S0128 | BADNEWS | T1036.001 | Masquerading: Invalid Code Signature | BADNEWS is sometimes signed with an invalid Authenticode certificate in an apparent effort to make it look more legitimate. | BADNEWS is malware that has been used by the actors responsible for the Patchwork campaign. Its name was given due to its use of RSS feeds, forums, and blogs for command and control. | https://attack.mitre.org/software/S0128 |
S0128 | BADNEWS | .005 | Masquerading: Match Legitimate Name or Location | BADNEWS attempts to hide its payloads using legitimate filenames. | BADNEWS is malware that has been used by the actors responsible for the Patchwork campaign. Its name was given due to its use of RSS feeds, forums, and blogs for command and control. | https://attack.mitre.org/software/S0128 |
S0128 | BADNEWS | T1106 | Native API | BADNEWS has a command to download an .exe and execute it via CreateProcess API. It can also run with ShellExecute. | BADNEWS is malware that has been used by the actors responsible for the Patchwork campaign. Its name was given due to its use of RSS feeds, forums, and blogs for command and control. | https://attack.mitre.org/software/S0128 |
S0128 | BADNEWS | T1120 | Peripheral Device Discovery | BADNEWS checks for new hard drives on the victim, such as USB devices, by listening for the WM_DEVICECHANGE window message. | BADNEWS is malware that has been used by the actors responsible for the Patchwork campaign. Its name was given due to its use of RSS feeds, forums, and blogs for command and control. | https://attack.mitre.org/software/S0128 |
S0128 | BADNEWS | T1055.012 | Process Injection: Process Hollowing | BADNEWS has a command to download an .exe and use process hollowing to inject it into a new process. | BADNEWS is malware that has been used by the actors responsible for the Patchwork campaign. Its name was given due to its use of RSS feeds, forums, and blogs for command and control. | https://attack.mitre.org/software/S0128 |
S0128 | BADNEWS | T1053.005 | Scheduled Task/Job: Scheduled Task | BADNEWS creates a scheduled task to establish by executing a malicious payload every subsequent minute. | BADNEWS is malware that has been used by the actors responsible for the Patchwork campaign. Its name was given due to its use of RSS feeds, forums, and blogs for command and control. | https://attack.mitre.org/software/S0128 |
S0128 | BADNEWS | T1113 | Screen Capture | BADNEWS has a command to take a screenshot and send it to the C2 server. | BADNEWS is malware that has been used by the actors responsible for the Patchwork campaign. Its name was given due to its use of RSS feeds, forums, and blogs for command and control. | https://attack.mitre.org/software/S0128 |
S0128 | BADNEWS | T1102.001 | Web Service: Dead Drop Resolver | BADNEWS collects C2 information via a dead drop resolver. | BADNEWS is malware that has been used by the actors responsible for the Patchwork campaign. Its name was given due to its use of RSS feeds, forums, and blogs for command and control. | https://attack.mitre.org/software/S0128 |
S0128 | BADNEWS | .002 | Web Service: Bidirectional Communication | BADNEWS can use multiple C2 channels, including RSS feeds, Github, forums, and blogs. | BADNEWS is malware that has been used by the actors responsible for the Patchwork campaign. Its name was given due to its use of RSS feeds, forums, and blogs for command and control. | https://attack.mitre.org/software/S0128 |
S0337 | BadPatch | T1071.001 | Application Layer Protocol: Web Protocols | BadPatch uses HTTP for C2. | BadPatch is a Windows Trojan that was used in a Gaza Hackers-linked campaign. | https://attack.mitre.org/software/S0337 |
S0337 | BadPatch | .003 | Application Layer Protocol: Mail Protocols | BadPatch uses SMTP for C2. | BadPatch is a Windows Trojan that was used in a Gaza Hackers-linked campaign. | https://attack.mitre.org/software/S0337 |
S0337 | BadPatch | T1547.001 | Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder | BadPatch establishes a foothold by adding a link to the malware executable in the startup folder. | BadPatch is a Windows Trojan that was used in a Gaza Hackers-linked campaign. | https://attack.mitre.org/software/S0337 |
S0337 | BadPatch | T1005 | Data from Local System | BadPatch collects files from the local system that have the following extensions, then prepares them for exfiltration: .xls, .xlsx, .pdf, .mdb, .rar, .zip, .doc, .docx. | BadPatch is a Windows Trojan that was used in a Gaza Hackers-linked campaign. | https://attack.mitre.org/software/S0337 |
S0337 | BadPatch | T1074.001 | Data Staged: Local Data Staging | BadPatch stores collected data in log files before exfiltration. | BadPatch is a Windows Trojan that was used in a Gaza Hackers-linked campaign. | https://attack.mitre.org/software/S0337 |
S0337 | BadPatch | T1083 | File and Directory Discovery | BadPatch searches for files with specific file extensions. | BadPatch is a Windows Trojan that was used in a Gaza Hackers-linked campaign. | https://attack.mitre.org/software/S0337 |
S0337 | BadPatch | T1105 | Ingress Tool Transfer | BadPatch can download and execute or update malware. | BadPatch is a Windows Trojan that was used in a Gaza Hackers-linked campaign. | https://attack.mitre.org/software/S0337 |
S0337 | BadPatch | T1056.001 | Input Capture: Keylogging | BadPatch has a keylogging capability. | BadPatch is a Windows Trojan that was used in a Gaza Hackers-linked campaign. | https://attack.mitre.org/software/S0337 |
S0337 | BadPatch | T1113 | Screen Capture | BadPatch captures screenshots in .jpg format and then exfiltrates them. | BadPatch is a Windows Trojan that was used in a Gaza Hackers-linked campaign. | https://attack.mitre.org/software/S0337 |
S0337 | BadPatch | T1518.001 | Software Discovery: Security Software Discovery | BadPatch uses WMI to enumerate installed security products in the victim’s environment. | BadPatch is a Windows Trojan that was used in a Gaza Hackers-linked campaign. | https://attack.mitre.org/software/S0337 |
S0337 | BadPatch | T1082 | System Information Discovery | BadPatch collects the OS system, OS version, MAC address, and the computer name from the victim’s machine. | BadPatch is a Windows Trojan that was used in a Gaza Hackers-linked campaign. | https://attack.mitre.org/software/S0337 |
S0337 | BadPatch | T1497.001 | Virtualization/Sandbox Evasion: System Checks | BadPatch attempts to detect if it is being run in a Virtual Machine (VM) using a WMI query for disk drive name, BIOS, and motherboard information. | BadPatch is a Windows Trojan that was used in a Gaza Hackers-linked campaign. | https://attack.mitre.org/software/S0337 |
S0234 | Bandook | T1123 | Audio Capture | Bandook has modules that are capable of capturing audio. | Bandook is a commercially available RAT, written in Delphi and C++, that has been available since at least 2007. It has been used against government, financial, energy, healthcare, education, IT, and legal organizations in the US, South America, Europe, and Southeast Asia. Bandook has been used by Dark Caracal, as well as in a separate campaign referred to as "Operation Manul". | https://attack.mitre.org/software/S0234 |
S0234 | Bandook | T1059 | Command and Scripting Interpreter | Bandook can support commands to execute Java-based payloads. | Bandook is a commercially available RAT, written in Delphi and C++, that has been available since at least 2007. It has been used against government, financial, energy, healthcare, education, IT, and legal organizations in the US, South America, Europe, and Southeast Asia. Bandook has been used by Dark Caracal, as well as in a separate campaign referred to as "Operation Manul". | https://attack.mitre.org/software/S0234 |
S0234 | Bandook | .001 | PowerShell | Bandook has used PowerShell loaders as part of execution. | Bandook is a commercially available RAT, written in Delphi and C++, that has been available since at least 2007. It has been used against government, financial, energy, healthcare, education, IT, and legal organizations in the US, South America, Europe, and Southeast Asia. Bandook has been used by Dark Caracal, as well as in a separate campaign referred to as "Operation Manul". | https://attack.mitre.org/software/S0234 |
S0234 | Bandook | .003 | Windows Command Shell | Bandook is capable of spawning a Windows command shell. | Bandook is a commercially available RAT, written in Delphi and C++, that has been available since at least 2007. It has been used against government, financial, energy, healthcare, education, IT, and legal organizations in the US, South America, Europe, and Southeast Asia. Bandook has been used by Dark Caracal, as well as in a separate campaign referred to as "Operation Manul". | https://attack.mitre.org/software/S0234 |
S0234 | Bandook | .005 | Visual Basic | Bandook has used malicious VBA code against the target system. | Bandook is a commercially available RAT, written in Delphi and C++, that has been available since at least 2007. It has been used against government, financial, energy, healthcare, education, IT, and legal organizations in the US, South America, Europe, and Southeast Asia. Bandook has been used by Dark Caracal, as well as in a separate campaign referred to as "Operation Manul". | https://attack.mitre.org/software/S0234 |
S0234 | Bandook | .006 | Python | Bandook can support commands to execute Python-based payloads. | Bandook is a commercially available RAT, written in Delphi and C++, that has been available since at least 2007. It has been used against government, financial, energy, healthcare, education, IT, and legal organizations in the US, South America, Europe, and Southeast Asia. Bandook has been used by Dark Caracal, as well as in a separate campaign referred to as "Operation Manul". | https://attack.mitre.org/software/S0234 |
S0234 | Bandook | T1005 | Data from Local System | Bandook can collect local files from the system . | Bandook is a commercially available RAT, written in Delphi and C++, that has been available since at least 2007. It has been used against government, financial, energy, healthcare, education, IT, and legal organizations in the US, South America, Europe, and Southeast Asia. Bandook has been used by Dark Caracal, as well as in a separate campaign referred to as "Operation Manul". | https://attack.mitre.org/software/S0234 |
S0234 | Bandook | T1140 | Deobfuscate/Decode Files or Information | Bandook has decoded its PowerShell script. | Bandook is a commercially available RAT, written in Delphi and C++, that has been available since at least 2007. It has been used against government, financial, energy, healthcare, education, IT, and legal organizations in the US, South America, Europe, and Southeast Asia. Bandook has been used by Dark Caracal, as well as in a separate campaign referred to as "Operation Manul". | https://attack.mitre.org/software/S0234 |
S0234 | Bandook | T1573.001 | Encrypted Channel: Symmetric Cryptography | Bandook has used AES encryption for C2 communication. | Bandook is a commercially available RAT, written in Delphi and C++, that has been available since at least 2007. It has been used against government, financial, energy, healthcare, education, IT, and legal organizations in the US, South America, Europe, and Southeast Asia. Bandook has been used by Dark Caracal, as well as in a separate campaign referred to as "Operation Manul". | https://attack.mitre.org/software/S0234 |
S0234 | Bandook | T1041 | Exfiltration Over C2 Channel | Bandook can upload files from a victim's machine over the C2 channel. | Bandook is a commercially available RAT, written in Delphi and C++, that has been available since at least 2007. It has been used against government, financial, energy, healthcare, education, IT, and legal organizations in the US, South America, Europe, and Southeast Asia. Bandook has been used by Dark Caracal, as well as in a separate campaign referred to as "Operation Manul". | https://attack.mitre.org/software/S0234 |
S0234 | Bandook | T1083 | File and Directory Discovery | Bandook has a command to list files on a system. | Bandook is a commercially available RAT, written in Delphi and C++, that has been available since at least 2007. It has been used against government, financial, energy, healthcare, education, IT, and legal organizations in the US, South America, Europe, and Southeast Asia. Bandook has been used by Dark Caracal, as well as in a separate campaign referred to as "Operation Manul". | https://attack.mitre.org/software/S0234 |
S0234 | Bandook | T1070.004 | Indicator Removal: File Deletion | Bandook has a command to delete a file. | Bandook is a commercially available RAT, written in Delphi and C++, that has been available since at least 2007. It has been used against government, financial, energy, healthcare, education, IT, and legal organizations in the US, South America, Europe, and Southeast Asia. Bandook has been used by Dark Caracal, as well as in a separate campaign referred to as "Operation Manul". | https://attack.mitre.org/software/S0234 |
S0234 | Bandook | T1105 | Ingress Tool Transfer | Bandook can download files to the system. | Bandook is a commercially available RAT, written in Delphi and C++, that has been available since at least 2007. It has been used against government, financial, energy, healthcare, education, IT, and legal organizations in the US, South America, Europe, and Southeast Asia. Bandook has been used by Dark Caracal, as well as in a separate campaign referred to as "Operation Manul". | https://attack.mitre.org/software/S0234 |
S0234 | Bandook | T1056.001 | Input Capture: Keylogging | Bandook contains keylogging capabilities. | Bandook is a commercially available RAT, written in Delphi and C++, that has been available since at least 2007. It has been used against government, financial, energy, healthcare, education, IT, and legal organizations in the US, South America, Europe, and Southeast Asia. Bandook has been used by Dark Caracal, as well as in a separate campaign referred to as "Operation Manul". | https://attack.mitre.org/software/S0234 |
S0234 | Bandook | T1106 | Native API | Bandook has used the ShellExecuteW() function call. | Bandook is a commercially available RAT, written in Delphi and C++, that has been available since at least 2007. It has been used against government, financial, energy, healthcare, education, IT, and legal organizations in the US, South America, Europe, and Southeast Asia. Bandook has been used by Dark Caracal, as well as in a separate campaign referred to as "Operation Manul". | https://attack.mitre.org/software/S0234 |
S0234 | Bandook | T1095 | Non-Application Layer Protocol | Bandook has a command built in to use a raw TCP socket. | Bandook is a commercially available RAT, written in Delphi and C++, that has been available since at least 2007. It has been used against government, financial, energy, healthcare, education, IT, and legal organizations in the US, South America, Europe, and Southeast Asia. Bandook has been used by Dark Caracal, as well as in a separate campaign referred to as "Operation Manul". | https://attack.mitre.org/software/S0234 |
S0234 | Bandook | T1027.003 | Obfuscated Files or Information: Steganography | Bandook has used .PNG images within a zip file to build the executable. | Bandook is a commercially available RAT, written in Delphi and C++, that has been available since at least 2007. It has been used against government, financial, energy, healthcare, education, IT, and legal organizations in the US, South America, Europe, and Southeast Asia. Bandook has been used by Dark Caracal, as well as in a separate campaign referred to as "Operation Manul". | https://attack.mitre.org/software/S0234 |
S0234 | Bandook | T1120 | Peripheral Device Discovery | Bandook can detect USB devices. | Bandook is a commercially available RAT, written in Delphi and C++, that has been available since at least 2007. It has been used against government, financial, energy, healthcare, education, IT, and legal organizations in the US, South America, Europe, and Southeast Asia. Bandook has been used by Dark Caracal, as well as in a separate campaign referred to as "Operation Manul". | https://attack.mitre.org/software/S0234 |
S0234 | Bandook | T1566.001 | Phishing: Spearphishing Attachment | Bandook is delivered via a malicious Word document inside a zip file. | Bandook is a commercially available RAT, written in Delphi and C++, that has been available since at least 2007. It has been used against government, financial, energy, healthcare, education, IT, and legal organizations in the US, South America, Europe, and Southeast Asia. Bandook has been used by Dark Caracal, as well as in a separate campaign referred to as "Operation Manul". | https://attack.mitre.org/software/S0234 |
S0234 | Bandook | T1055.012 | Process Injection: Process Hollowing | Bandook has been launched by starting iexplore.exe and replacing it with Bandook's payload. | Bandook is a commercially available RAT, written in Delphi and C++, that has been available since at least 2007. It has been used against government, financial, energy, healthcare, education, IT, and legal organizations in the US, South America, Europe, and Southeast Asia. Bandook has been used by Dark Caracal, as well as in a separate campaign referred to as "Operation Manul". | https://attack.mitre.org/software/S0234 |
S0234 | Bandook | T1113 | Screen Capture | Bandook is capable of taking an image of and uploading the current desktop. | Bandook is a commercially available RAT, written in Delphi and C++, that has been available since at least 2007. It has been used against government, financial, energy, healthcare, education, IT, and legal organizations in the US, South America, Europe, and Southeast Asia. Bandook has been used by Dark Caracal, as well as in a separate campaign referred to as "Operation Manul". | https://attack.mitre.org/software/S0234 |
S0234 | Bandook | T1553.002 | Subvert Trust Controls: Code Signing | Bandook was signed with valid Certum certificates. | Bandook is a commercially available RAT, written in Delphi and C++, that has been available since at least 2007. It has been used against government, financial, energy, healthcare, education, IT, and legal organizations in the US, South America, Europe, and Southeast Asia. Bandook has been used by Dark Caracal, as well as in a separate campaign referred to as "Operation Manul". | https://attack.mitre.org/software/S0234 |
S0234 | Bandook | T1082 | System Information Discovery | Bandook can collect information about the drives available on the system. | Bandook is a commercially available RAT, written in Delphi and C++, that has been available since at least 2007. It has been used against government, financial, energy, healthcare, education, IT, and legal organizations in the US, South America, Europe, and Southeast Asia. Bandook has been used by Dark Caracal, as well as in a separate campaign referred to as "Operation Manul". | https://attack.mitre.org/software/S0234 |
S0234 | Bandook | T1016 | System Network Configuration Discovery | Bandook has a command to get the public IP address from a system. | Bandook is a commercially available RAT, written in Delphi and C++, that has been available since at least 2007. It has been used against government, financial, energy, healthcare, education, IT, and legal organizations in the US, South America, Europe, and Southeast Asia. Bandook has been used by Dark Caracal, as well as in a separate campaign referred to as "Operation Manul". | https://attack.mitre.org/software/S0234 |
S0234 | Bandook | T1204.002 | User Execution: Malicious File | Bandook has used lure documents to convince the user to enable macros. | Bandook is a commercially available RAT, written in Delphi and C++, that has been available since at least 2007. It has been used against government, financial, energy, healthcare, education, IT, and legal organizations in the US, South America, Europe, and Southeast Asia. Bandook has been used by Dark Caracal, as well as in a separate campaign referred to as "Operation Manul". | https://attack.mitre.org/software/S0234 |
S0234 | Bandook | T1125 | Video Capture | Bandook has modules that are capable of capturing video from a victim's webcam. | Bandook is a commercially available RAT, written in Delphi and C++, that has been available since at least 2007. It has been used against government, financial, energy, healthcare, education, IT, and legal organizations in the US, South America, Europe, and Southeast Asia. Bandook has been used by Dark Caracal, as well as in a separate campaign referred to as "Operation Manul". | https://attack.mitre.org/software/S0234 |
S0239 | Bankshot | T1134.002 | Access Token Manipulation: Create Process with Token | Bankshot grabs a user token using WTSQueryUserToken and then creates a process by impersonating a logged-on user. | Bankshot is a remote access tool (RAT) that was first reported by the Department of Homeland Security in December of 2017. In 2018, Lazarus Group used the Bankshot implant in attacks against the Turkish financial sector. | https://attack.mitre.org/software/S0239 |
S0239 | Bankshot | T1087.001 | Account Discovery: Local Account | Bankshot gathers domain and account names/information through process monitoring. | Bankshot is a remote access tool (RAT) that was first reported by the Department of Homeland Security in December of 2017. In 2018, Lazarus Group used the Bankshot implant in attacks against the Turkish financial sector. | https://attack.mitre.org/software/S0239 |
S0239 | Bankshot | .002 | Account Discovery: Domain Account | Bankshot gathers domain and account names/information through process monitoring. | Bankshot is a remote access tool (RAT) that was first reported by the Department of Homeland Security in December of 2017. In 2018, Lazarus Group used the Bankshot implant in attacks against the Turkish financial sector. | https://attack.mitre.org/software/S0239 |
S0239 | Bankshot | T1071.001 | Application Layer Protocol: Web Protocols | Bankshot uses HTTP for command and control communication. | Bankshot is a remote access tool (RAT) that was first reported by the Department of Homeland Security in December of 2017. In 2018, Lazarus Group used the Bankshot implant in attacks against the Turkish financial sector. | https://attack.mitre.org/software/S0239 |
S0239 | Bankshot | T1119 | Automated Collection | Bankshot recursively generates a list of files within a directory and sends them back to the control server. | Bankshot is a remote access tool (RAT) that was first reported by the Department of Homeland Security in December of 2017. In 2018, Lazarus Group used the Bankshot implant in attacks against the Turkish financial sector. | https://attack.mitre.org/software/S0239 |
S0239 | Bankshot | T1059.003 | Command and Scripting Interpreter: Windows Command Shell | Bankshot uses the command-line interface to execute arbitrary commands. | Bankshot is a remote access tool (RAT) that was first reported by the Department of Homeland Security in December of 2017. In 2018, Lazarus Group used the Bankshot implant in attacks against the Turkish financial sector. | https://attack.mitre.org/software/S0239 |
S0239 | Bankshot | T1543.003 | Create or Modify System Process: Windows Service | Bankshot can terminate a specific process by its process id. | Bankshot is a remote access tool (RAT) that was first reported by the Department of Homeland Security in December of 2017. In 2018, Lazarus Group used the Bankshot implant in attacks against the Turkish financial sector. | https://attack.mitre.org/software/S0239 |
S0239 | Bankshot | T1132.002 | Data Encoding: Non-Standard Encoding | Bankshot encodes commands from the control server using a range of characters and gzip. | Bankshot is a remote access tool (RAT) that was first reported by the Department of Homeland Security in December of 2017. In 2018, Lazarus Group used the Bankshot implant in attacks against the Turkish financial sector. | https://attack.mitre.org/software/S0239 |
S0239 | Bankshot | T1005 | Data from Local System | Bankshot collects files from the local system. | Bankshot is a remote access tool (RAT) that was first reported by the Department of Homeland Security in December of 2017. In 2018, Lazarus Group used the Bankshot implant in attacks against the Turkish financial sector. | https://attack.mitre.org/software/S0239 |
S0239 | Bankshot | T1001.003 | Data Obfuscation: Protocol or Service Impersonation | Bankshot generates a false TLS handshake using a public certificate to disguise C2 network communications. | Bankshot is a remote access tool (RAT) that was first reported by the Department of Homeland Security in December of 2017. In 2018, Lazarus Group used the Bankshot implant in attacks against the Turkish financial sector. | https://attack.mitre.org/software/S0239 |
S0239 | Bankshot | T1140 | Deobfuscate/Decode Files or Information | Bankshot decodes embedded XOR strings. | Bankshot is a remote access tool (RAT) that was first reported by the Department of Homeland Security in December of 2017. In 2018, Lazarus Group used the Bankshot implant in attacks against the Turkish financial sector. | https://attack.mitre.org/software/S0239 |
S0239 | Bankshot | T1041 | Exfiltration Over C2 Channel | Bankshot exfiltrates data over its C2 channel. | Bankshot is a remote access tool (RAT) that was first reported by the Department of Homeland Security in December of 2017. In 2018, Lazarus Group used the Bankshot implant in attacks against the Turkish financial sector. | https://attack.mitre.org/software/S0239 |
S0239 | Bankshot | T1203 | Exploitation for Client Execution | Bankshot leverages a known zero-day vulnerability in Adobe Flash to execute the implant into the victims’ machines. | Bankshot is a remote access tool (RAT) that was first reported by the Department of Homeland Security in December of 2017. In 2018, Lazarus Group used the Bankshot implant in attacks against the Turkish financial sector. | https://attack.mitre.org/software/S0239 |
S0239 | Bankshot | T1083 | File and Directory Discovery | Bankshot searches for files on the victim's machine. | Bankshot is a remote access tool (RAT) that was first reported by the Department of Homeland Security in December of 2017. In 2018, Lazarus Group used the Bankshot implant in attacks against the Turkish financial sector. | https://attack.mitre.org/software/S0239 |
S0239 | Bankshot | T1070 | Indicator Removal | Bankshot deletes all artifacts associated with the malware from the infected machine. | Bankshot is a remote access tool (RAT) that was first reported by the Department of Homeland Security in December of 2017. In 2018, Lazarus Group used the Bankshot implant in attacks against the Turkish financial sector. | https://attack.mitre.org/software/S0239 |
S0239 | Bankshot | .004 | File Deletion | Bankshot marks files to be deleted upon the next system reboot and uninstalls and removes itself from the system. | Bankshot is a remote access tool (RAT) that was first reported by the Department of Homeland Security in December of 2017. In 2018, Lazarus Group used the Bankshot implant in attacks against the Turkish financial sector. | https://attack.mitre.org/software/S0239 |
S0239 | Bankshot | .006 | Timestomp | Bankshot modifies the time of a file as specified by the control server. | Bankshot is a remote access tool (RAT) that was first reported by the Department of Homeland Security in December of 2017. In 2018, Lazarus Group used the Bankshot implant in attacks against the Turkish financial sector. | https://attack.mitre.org/software/S0239 |
S0239 | Bankshot | T1105 | Ingress Tool Transfer | Bankshot uploads files and secondary payloads to the victim's machine. | Bankshot is a remote access tool (RAT) that was first reported by the Department of Homeland Security in December of 2017. In 2018, Lazarus Group used the Bankshot implant in attacks against the Turkish financial sector. | https://attack.mitre.org/software/S0239 |
S0239 | Bankshot | T1112 | Modify Registry | Bankshot writes data into the Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Pniumj. | Bankshot is a remote access tool (RAT) that was first reported by the Department of Homeland Security in December of 2017. In 2018, Lazarus Group used the Bankshot implant in attacks against the Turkish financial sector. | https://attack.mitre.org/software/S0239 |
S0239 | Bankshot | T1106 | Native API | Bankshot creates processes using the Windows API calls: CreateProcessA() and CreateProcessAsUserA(). | Bankshot is a remote access tool (RAT) that was first reported by the Department of Homeland Security in December of 2017. In 2018, Lazarus Group used the Bankshot implant in attacks against the Turkish financial sector. | https://attack.mitre.org/software/S0239 |
S0239 | Bankshot | T1571 | Non-Standard Port | Bankshot binds and listens on port 1058 for HTTP traffic while also utilizing a FakeTLS method. | Bankshot is a remote access tool (RAT) that was first reported by the Department of Homeland Security in December of 2017. In 2018, Lazarus Group used the Bankshot implant in attacks against the Turkish financial sector. | https://attack.mitre.org/software/S0239 |
S0239 | Bankshot | T1057 | Process Discovery | Bankshot identifies processes and collects the process ids. | Bankshot is a remote access tool (RAT) that was first reported by the Department of Homeland Security in December of 2017. In 2018, Lazarus Group used the Bankshot implant in attacks against the Turkish financial sector. | https://attack.mitre.org/software/S0239 |
Subsets and Splits