software_id
stringclasses
826 values
software
stringclasses
826 values
technique_id
stringclasses
597 values
technique_name
stringclasses
602 values
technique_use
stringlengths
23
663
description
stringclasses
826 values
url
stringclasses
826 values
S1081
BADHATCH
T1057
Process Discovery
BADHATCH can retrieve a list of running processes from a compromised machine.
BADHATCH is a backdoor that has been utilized by FIN8 since at least 2019. BADHATCH has been used to target the insurance, retail, technology, and chemical industries in the United States, Canada, South Africa, Panama, and Italy.
https://attack.mitre.org/software/S1081
S1081
BADHATCH
T1055
Process Injection
BADHATCH can inject itself into an existing explorer.exe process by using RtlCreateUserThread.
BADHATCH is a backdoor that has been utilized by FIN8 since at least 2019. BADHATCH has been used to target the insurance, retail, technology, and chemical industries in the United States, Canada, South Africa, Panama, and Italy.
https://attack.mitre.org/software/S1081
S1081
BADHATCH
.001
Dynamic-link Library Injection
BADHATCH has the ability to execute a malicious DLL by injecting into explorer.exe on a compromised machine.
BADHATCH is a backdoor that has been utilized by FIN8 since at least 2019. BADHATCH has been used to target the insurance, retail, technology, and chemical industries in the United States, Canada, South Africa, Panama, and Italy.
https://attack.mitre.org/software/S1081
S1081
BADHATCH
.004
Asynchronous Procedure Call
BADHATCH can inject itself into a new svchost.exe -k netsvcs process using the asynchronous procedure call (APC) queue.
BADHATCH is a backdoor that has been utilized by FIN8 since at least 2019. BADHATCH has been used to target the insurance, retail, technology, and chemical industries in the United States, Canada, South Africa, Panama, and Italy.
https://attack.mitre.org/software/S1081
S1081
BADHATCH
T1090
Proxy
BADHATCH can use SOCKS4 and SOCKS5 proxies to connect to actor-controlled C2 servers. BADHATCH can also emulate a reverse proxy on a compromised machine to connect with actor-controlled C2 servers.
BADHATCH is a backdoor that has been utilized by FIN8 since at least 2019. BADHATCH has been used to target the insurance, retail, technology, and chemical industries in the United States, Canada, South Africa, Panama, and Italy.
https://attack.mitre.org/software/S1081
S1081
BADHATCH
T1620
Reflective Code Loading
BADHATCH can copy a large byte array of 64-bit shellcode into process memory and execute it with a call to CreateThread.
BADHATCH is a backdoor that has been utilized by FIN8 since at least 2019. BADHATCH has been used to target the insurance, retail, technology, and chemical industries in the United States, Canada, South Africa, Panama, and Italy.
https://attack.mitre.org/software/S1081
S1081
BADHATCH
T1018
Remote System Discovery
BADHATCH can use a PowerShell object such as, System.Net.NetworkInformation.Ping to ping a computer.
BADHATCH is a backdoor that has been utilized by FIN8 since at least 2019. BADHATCH has been used to target the insurance, retail, technology, and chemical industries in the United States, Canada, South Africa, Panama, and Italy.
https://attack.mitre.org/software/S1081
S1081
BADHATCH
T1053.005
Scheduled Task/Job: Scheduled Task
BADHATCH can use schtasks.exe to gain persistence.
BADHATCH is a backdoor that has been utilized by FIN8 since at least 2019. BADHATCH has been used to target the insurance, retail, technology, and chemical industries in the United States, Canada, South Africa, Panama, and Italy.
https://attack.mitre.org/software/S1081
S1081
BADHATCH
T1113
Screen Capture
BADHATCH can take screenshots and send them to an actor-controlled C2 server.
BADHATCH is a backdoor that has been utilized by FIN8 since at least 2019. BADHATCH has been used to target the insurance, retail, technology, and chemical industries in the United States, Canada, South Africa, Panama, and Italy.
https://attack.mitre.org/software/S1081
S1081
BADHATCH
T1082
System Information Discovery
BADHATCH can obtain current system information from a compromised machine such as the SHELL PID, PSVERSION, HOSTNAME, LOGONSERVER, LASTBOOTUP, drive information, OS type/version, bitness, and hostname.
BADHATCH is a backdoor that has been utilized by FIN8 since at least 2019. BADHATCH has been used to target the insurance, retail, technology, and chemical industries in the United States, Canada, South Africa, Panama, and Italy.
https://attack.mitre.org/software/S1081
S1081
BADHATCH
T1049
System Network Connections Discovery
BADHATCH can execute netstat.exe -f on a compromised machine.
BADHATCH is a backdoor that has been utilized by FIN8 since at least 2019. BADHATCH has been used to target the insurance, retail, technology, and chemical industries in the United States, Canada, South Africa, Panama, and Italy.
https://attack.mitre.org/software/S1081
S1081
BADHATCH
T1033
System Owner/User Discovery
BADHATCH can obtain logged user information from a compromised machine and can execute the command whoami.exe.
BADHATCH is a backdoor that has been utilized by FIN8 since at least 2019. BADHATCH has been used to target the insurance, retail, technology, and chemical industries in the United States, Canada, South Africa, Panama, and Italy.
https://attack.mitre.org/software/S1081
S1081
BADHATCH
T1124
System Time Discovery
BADHATCH can obtain the DATETIME and UPTIME from a compromised machine.
BADHATCH is a backdoor that has been utilized by FIN8 since at least 2019. BADHATCH has been used to target the insurance, retail, technology, and chemical industries in the United States, Canada, South Africa, Panama, and Italy.
https://attack.mitre.org/software/S1081
S1081
BADHATCH
T1550.002
Use Alternate Authentication Material: Pass the Hash
BADHATCH can perform pass the hash on compromised machines with x64 versions.
BADHATCH is a backdoor that has been utilized by FIN8 since at least 2019. BADHATCH has been used to target the insurance, retail, technology, and chemical industries in the United States, Canada, South Africa, Panama, and Italy.
https://attack.mitre.org/software/S1081
S1081
BADHATCH
T1102
Web Service
BADHATCH can be utilized to abuse sslip.io, a free IP to domain mapping service, as part of actor-controlled C2 channels.
BADHATCH is a backdoor that has been utilized by FIN8 since at least 2019. BADHATCH has been used to target the insurance, retail, technology, and chemical industries in the United States, Canada, South Africa, Panama, and Italy.
https://attack.mitre.org/software/S1081
S1081
BADHATCH
T1047
Windows Management Instrumentation
BADHATCH can utilize WMI to collect system information, create new processes, and run malicious PowerShell scripts on a compromised machine.
BADHATCH is a backdoor that has been utilized by FIN8 since at least 2019. BADHATCH has been used to target the insurance, retail, technology, and chemical industries in the United States, Canada, South Africa, Panama, and Italy.
https://attack.mitre.org/software/S1081
S0128
BADNEWS
T1071.001
Application Layer Protocol: Web Protocols
BADNEWS establishes a backdoor over HTTP.
BADNEWS is malware that has been used by the actors responsible for the Patchwork campaign. Its name was given due to its use of RSS feeds, forums, and blogs for command and control.
https://attack.mitre.org/software/S0128
S0128
BADNEWS
T1119
Automated Collection
BADNEWS monitors USB devices and copies files with certain extensions to a predefined directory.
BADNEWS is malware that has been used by the actors responsible for the Patchwork campaign. Its name was given due to its use of RSS feeds, forums, and blogs for command and control.
https://attack.mitre.org/software/S0128
S0128
BADNEWS
T1547.001
Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder
BADNEWS installs a registry Run key to establish persistence.
BADNEWS is malware that has been used by the actors responsible for the Patchwork campaign. Its name was given due to its use of RSS feeds, forums, and blogs for command and control.
https://attack.mitre.org/software/S0128
S0128
BADNEWS
T1059.003
Command and Scripting Interpreter: Windows Command Shell
BADNEWS is capable of executing commands via cmd.exe.
BADNEWS is malware that has been used by the actors responsible for the Patchwork campaign. Its name was given due to its use of RSS feeds, forums, and blogs for command and control.
https://attack.mitre.org/software/S0128
S0128
BADNEWS
T1132
Data Encoding
After encrypting C2 data, BADNEWS converts it into a hexadecimal representation and then encodes it into base64.
BADNEWS is malware that has been used by the actors responsible for the Patchwork campaign. Its name was given due to its use of RSS feeds, forums, and blogs for command and control.
https://attack.mitre.org/software/S0128
S0128
BADNEWS
.001
Standard Encoding
BADNEWS encodes C2 traffic with base64.
BADNEWS is malware that has been used by the actors responsible for the Patchwork campaign. Its name was given due to its use of RSS feeds, forums, and blogs for command and control.
https://attack.mitre.org/software/S0128
S0128
BADNEWS
T1005
Data from Local System
When it first starts, BADNEWS crawls the victim's local drives and collects documents with the following extensions: .doc, .docx, .pdf, .ppt, .pptx, and .txt.
BADNEWS is malware that has been used by the actors responsible for the Patchwork campaign. Its name was given due to its use of RSS feeds, forums, and blogs for command and control.
https://attack.mitre.org/software/S0128
S0128
BADNEWS
T1039
Data from Network Shared Drive
When it first starts, BADNEWS crawls the victim's mapped drives and collects documents with the following extensions: .doc, .docx, .pdf, .ppt, .pptx, and .txt.
BADNEWS is malware that has been used by the actors responsible for the Patchwork campaign. Its name was given due to its use of RSS feeds, forums, and blogs for command and control.
https://attack.mitre.org/software/S0128
S0128
BADNEWS
T1025
Data from Removable Media
BADNEWS copies files with certain extensions from USB devices toa predefined directory.
BADNEWS is malware that has been used by the actors responsible for the Patchwork campaign. Its name was given due to its use of RSS feeds, forums, and blogs for command and control.
https://attack.mitre.org/software/S0128
S0128
BADNEWS
T1074.001
Data Staged: Local Data Staging
BADNEWS copies documents under 15MB found on the victim system to is the user's %temp%\SMB\ folder. It also copies files from USB devices to a predefined directory.
BADNEWS is malware that has been used by the actors responsible for the Patchwork campaign. Its name was given due to its use of RSS feeds, forums, and blogs for command and control.
https://attack.mitre.org/software/S0128
S0128
BADNEWS
T1573.001
Encrypted Channel: Symmetric Cryptography
BADNEWS encrypts C2 data with a ROR by 3 and an XOR by 0x23.
BADNEWS is malware that has been used by the actors responsible for the Patchwork campaign. Its name was given due to its use of RSS feeds, forums, and blogs for command and control.
https://attack.mitre.org/software/S0128
S0128
BADNEWS
T1083
File and Directory Discovery
BADNEWS identifies files with certain extensions from USB devices, then copies them to a predefined directory.
BADNEWS is malware that has been used by the actors responsible for the Patchwork campaign. Its name was given due to its use of RSS feeds, forums, and blogs for command and control.
https://attack.mitre.org/software/S0128
S0128
BADNEWS
T1574.002
Hijack Execution Flow: DLL Side-Loading
BADNEWS typically loads its DLL file into a legitimate signed Java or VMware executable.
BADNEWS is malware that has been used by the actors responsible for the Patchwork campaign. Its name was given due to its use of RSS feeds, forums, and blogs for command and control.
https://attack.mitre.org/software/S0128
S0128
BADNEWS
T1105
Ingress Tool Transfer
BADNEWS is capable of downloading additional files through C2 channels, including a new version of itself.
BADNEWS is malware that has been used by the actors responsible for the Patchwork campaign. Its name was given due to its use of RSS feeds, forums, and blogs for command and control.
https://attack.mitre.org/software/S0128
S0128
BADNEWS
T1056.001
Input Capture: Keylogging
When it first starts, BADNEWS spawns a new thread to log keystrokes.
BADNEWS is malware that has been used by the actors responsible for the Patchwork campaign. Its name was given due to its use of RSS feeds, forums, and blogs for command and control.
https://attack.mitre.org/software/S0128
S0128
BADNEWS
T1036.001
Masquerading: Invalid Code Signature
BADNEWS is sometimes signed with an invalid Authenticode certificate in an apparent effort to make it look more legitimate.
BADNEWS is malware that has been used by the actors responsible for the Patchwork campaign. Its name was given due to its use of RSS feeds, forums, and blogs for command and control.
https://attack.mitre.org/software/S0128
S0128
BADNEWS
.005
Masquerading: Match Legitimate Name or Location
BADNEWS attempts to hide its payloads using legitimate filenames.
BADNEWS is malware that has been used by the actors responsible for the Patchwork campaign. Its name was given due to its use of RSS feeds, forums, and blogs for command and control.
https://attack.mitre.org/software/S0128
S0128
BADNEWS
T1106
Native API
BADNEWS has a command to download an .exe and execute it via CreateProcess API. It can also run with ShellExecute.
BADNEWS is malware that has been used by the actors responsible for the Patchwork campaign. Its name was given due to its use of RSS feeds, forums, and blogs for command and control.
https://attack.mitre.org/software/S0128
S0128
BADNEWS
T1120
Peripheral Device Discovery
BADNEWS checks for new hard drives on the victim, such as USB devices, by listening for the WM_DEVICECHANGE window message.
BADNEWS is malware that has been used by the actors responsible for the Patchwork campaign. Its name was given due to its use of RSS feeds, forums, and blogs for command and control.
https://attack.mitre.org/software/S0128
S0128
BADNEWS
T1055.012
Process Injection: Process Hollowing
BADNEWS has a command to download an .exe and use process hollowing to inject it into a new process.
BADNEWS is malware that has been used by the actors responsible for the Patchwork campaign. Its name was given due to its use of RSS feeds, forums, and blogs for command and control.
https://attack.mitre.org/software/S0128
S0128
BADNEWS
T1053.005
Scheduled Task/Job: Scheduled Task
BADNEWS creates a scheduled task to establish by executing a malicious payload every subsequent minute.
BADNEWS is malware that has been used by the actors responsible for the Patchwork campaign. Its name was given due to its use of RSS feeds, forums, and blogs for command and control.
https://attack.mitre.org/software/S0128
S0128
BADNEWS
T1113
Screen Capture
BADNEWS has a command to take a screenshot and send it to the C2 server.
BADNEWS is malware that has been used by the actors responsible for the Patchwork campaign. Its name was given due to its use of RSS feeds, forums, and blogs for command and control.
https://attack.mitre.org/software/S0128
S0128
BADNEWS
T1102.001
Web Service: Dead Drop Resolver
BADNEWS collects C2 information via a dead drop resolver.
BADNEWS is malware that has been used by the actors responsible for the Patchwork campaign. Its name was given due to its use of RSS feeds, forums, and blogs for command and control.
https://attack.mitre.org/software/S0128
S0128
BADNEWS
.002
Web Service: Bidirectional Communication
BADNEWS can use multiple C2 channels, including RSS feeds, Github, forums, and blogs.
BADNEWS is malware that has been used by the actors responsible for the Patchwork campaign. Its name was given due to its use of RSS feeds, forums, and blogs for command and control.
https://attack.mitre.org/software/S0128
S0337
BadPatch
T1071.001
Application Layer Protocol: Web Protocols
BadPatch uses HTTP for C2.
BadPatch is a Windows Trojan that was used in a Gaza Hackers-linked campaign.
https://attack.mitre.org/software/S0337
S0337
BadPatch
.003
Application Layer Protocol: Mail Protocols
BadPatch uses SMTP for C2.
BadPatch is a Windows Trojan that was used in a Gaza Hackers-linked campaign.
https://attack.mitre.org/software/S0337
S0337
BadPatch
T1547.001
Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder
BadPatch establishes a foothold by adding a link to the malware executable in the startup folder.
BadPatch is a Windows Trojan that was used in a Gaza Hackers-linked campaign.
https://attack.mitre.org/software/S0337
S0337
BadPatch
T1005
Data from Local System
BadPatch collects files from the local system that have the following extensions, then prepares them for exfiltration: .xls, .xlsx, .pdf, .mdb, .rar, .zip, .doc, .docx.
BadPatch is a Windows Trojan that was used in a Gaza Hackers-linked campaign.
https://attack.mitre.org/software/S0337
S0337
BadPatch
T1074.001
Data Staged: Local Data Staging
BadPatch stores collected data in log files before exfiltration.
BadPatch is a Windows Trojan that was used in a Gaza Hackers-linked campaign.
https://attack.mitre.org/software/S0337
S0337
BadPatch
T1083
File and Directory Discovery
BadPatch searches for files with specific file extensions.
BadPatch is a Windows Trojan that was used in a Gaza Hackers-linked campaign.
https://attack.mitre.org/software/S0337
S0337
BadPatch
T1105
Ingress Tool Transfer
BadPatch can download and execute or update malware.
BadPatch is a Windows Trojan that was used in a Gaza Hackers-linked campaign.
https://attack.mitre.org/software/S0337
S0337
BadPatch
T1056.001
Input Capture: Keylogging
BadPatch has a keylogging capability.
BadPatch is a Windows Trojan that was used in a Gaza Hackers-linked campaign.
https://attack.mitre.org/software/S0337
S0337
BadPatch
T1113
Screen Capture
BadPatch captures screenshots in .jpg format and then exfiltrates them.
BadPatch is a Windows Trojan that was used in a Gaza Hackers-linked campaign.
https://attack.mitre.org/software/S0337
S0337
BadPatch
T1518.001
Software Discovery: Security Software Discovery
BadPatch uses WMI to enumerate installed security products in the victim’s environment.
BadPatch is a Windows Trojan that was used in a Gaza Hackers-linked campaign.
https://attack.mitre.org/software/S0337
S0337
BadPatch
T1082
System Information Discovery
BadPatch collects the OS system, OS version, MAC address, and the computer name from the victim’s machine.
BadPatch is a Windows Trojan that was used in a Gaza Hackers-linked campaign.
https://attack.mitre.org/software/S0337
S0337
BadPatch
T1497.001
Virtualization/Sandbox Evasion: System Checks
BadPatch attempts to detect if it is being run in a Virtual Machine (VM) using a WMI query for disk drive name, BIOS, and motherboard information.
BadPatch is a Windows Trojan that was used in a Gaza Hackers-linked campaign.
https://attack.mitre.org/software/S0337
S0234
Bandook
T1123
Audio Capture
Bandook has modules that are capable of capturing audio.
Bandook is a commercially available RAT, written in Delphi and C++, that has been available since at least 2007. It has been used against government, financial, energy, healthcare, education, IT, and legal organizations in the US, South America, Europe, and Southeast Asia. Bandook has been used by Dark Caracal, as well as in a separate campaign referred to as "Operation Manul".
https://attack.mitre.org/software/S0234
S0234
Bandook
T1059
Command and Scripting Interpreter
Bandook can support commands to execute Java-based payloads.
Bandook is a commercially available RAT, written in Delphi and C++, that has been available since at least 2007. It has been used against government, financial, energy, healthcare, education, IT, and legal organizations in the US, South America, Europe, and Southeast Asia. Bandook has been used by Dark Caracal, as well as in a separate campaign referred to as "Operation Manul".
https://attack.mitre.org/software/S0234
S0234
Bandook
.001
PowerShell
Bandook has used PowerShell loaders as part of execution.
Bandook is a commercially available RAT, written in Delphi and C++, that has been available since at least 2007. It has been used against government, financial, energy, healthcare, education, IT, and legal organizations in the US, South America, Europe, and Southeast Asia. Bandook has been used by Dark Caracal, as well as in a separate campaign referred to as "Operation Manul".
https://attack.mitre.org/software/S0234
S0234
Bandook
.003
Windows Command Shell
Bandook is capable of spawning a Windows command shell.
Bandook is a commercially available RAT, written in Delphi and C++, that has been available since at least 2007. It has been used against government, financial, energy, healthcare, education, IT, and legal organizations in the US, South America, Europe, and Southeast Asia. Bandook has been used by Dark Caracal, as well as in a separate campaign referred to as "Operation Manul".
https://attack.mitre.org/software/S0234
S0234
Bandook
.005
Visual Basic
Bandook has used malicious VBA code against the target system.
Bandook is a commercially available RAT, written in Delphi and C++, that has been available since at least 2007. It has been used against government, financial, energy, healthcare, education, IT, and legal organizations in the US, South America, Europe, and Southeast Asia. Bandook has been used by Dark Caracal, as well as in a separate campaign referred to as "Operation Manul".
https://attack.mitre.org/software/S0234
S0234
Bandook
.006
Python
Bandook can support commands to execute Python-based payloads.
Bandook is a commercially available RAT, written in Delphi and C++, that has been available since at least 2007. It has been used against government, financial, energy, healthcare, education, IT, and legal organizations in the US, South America, Europe, and Southeast Asia. Bandook has been used by Dark Caracal, as well as in a separate campaign referred to as "Operation Manul".
https://attack.mitre.org/software/S0234
S0234
Bandook
T1005
Data from Local System
Bandook can collect local files from the system .
Bandook is a commercially available RAT, written in Delphi and C++, that has been available since at least 2007. It has been used against government, financial, energy, healthcare, education, IT, and legal organizations in the US, South America, Europe, and Southeast Asia. Bandook has been used by Dark Caracal, as well as in a separate campaign referred to as "Operation Manul".
https://attack.mitre.org/software/S0234
S0234
Bandook
T1140
Deobfuscate/Decode Files or Information
Bandook has decoded its PowerShell script.
Bandook is a commercially available RAT, written in Delphi and C++, that has been available since at least 2007. It has been used against government, financial, energy, healthcare, education, IT, and legal organizations in the US, South America, Europe, and Southeast Asia. Bandook has been used by Dark Caracal, as well as in a separate campaign referred to as "Operation Manul".
https://attack.mitre.org/software/S0234
S0234
Bandook
T1573.001
Encrypted Channel: Symmetric Cryptography
Bandook has used AES encryption for C2 communication.
Bandook is a commercially available RAT, written in Delphi and C++, that has been available since at least 2007. It has been used against government, financial, energy, healthcare, education, IT, and legal organizations in the US, South America, Europe, and Southeast Asia. Bandook has been used by Dark Caracal, as well as in a separate campaign referred to as "Operation Manul".
https://attack.mitre.org/software/S0234
S0234
Bandook
T1041
Exfiltration Over C2 Channel
Bandook can upload files from a victim's machine over the C2 channel.
Bandook is a commercially available RAT, written in Delphi and C++, that has been available since at least 2007. It has been used against government, financial, energy, healthcare, education, IT, and legal organizations in the US, South America, Europe, and Southeast Asia. Bandook has been used by Dark Caracal, as well as in a separate campaign referred to as "Operation Manul".
https://attack.mitre.org/software/S0234
S0234
Bandook
T1083
File and Directory Discovery
Bandook has a command to list files on a system.
Bandook is a commercially available RAT, written in Delphi and C++, that has been available since at least 2007. It has been used against government, financial, energy, healthcare, education, IT, and legal organizations in the US, South America, Europe, and Southeast Asia. Bandook has been used by Dark Caracal, as well as in a separate campaign referred to as "Operation Manul".
https://attack.mitre.org/software/S0234
S0234
Bandook
T1070.004
Indicator Removal: File Deletion
Bandook has a command to delete a file.
Bandook is a commercially available RAT, written in Delphi and C++, that has been available since at least 2007. It has been used against government, financial, energy, healthcare, education, IT, and legal organizations in the US, South America, Europe, and Southeast Asia. Bandook has been used by Dark Caracal, as well as in a separate campaign referred to as "Operation Manul".
https://attack.mitre.org/software/S0234
S0234
Bandook
T1105
Ingress Tool Transfer
Bandook can download files to the system.
Bandook is a commercially available RAT, written in Delphi and C++, that has been available since at least 2007. It has been used against government, financial, energy, healthcare, education, IT, and legal organizations in the US, South America, Europe, and Southeast Asia. Bandook has been used by Dark Caracal, as well as in a separate campaign referred to as "Operation Manul".
https://attack.mitre.org/software/S0234
S0234
Bandook
T1056.001
Input Capture: Keylogging
Bandook contains keylogging capabilities.
Bandook is a commercially available RAT, written in Delphi and C++, that has been available since at least 2007. It has been used against government, financial, energy, healthcare, education, IT, and legal organizations in the US, South America, Europe, and Southeast Asia. Bandook has been used by Dark Caracal, as well as in a separate campaign referred to as "Operation Manul".
https://attack.mitre.org/software/S0234
S0234
Bandook
T1106
Native API
Bandook has used the ShellExecuteW() function call.
Bandook is a commercially available RAT, written in Delphi and C++, that has been available since at least 2007. It has been used against government, financial, energy, healthcare, education, IT, and legal organizations in the US, South America, Europe, and Southeast Asia. Bandook has been used by Dark Caracal, as well as in a separate campaign referred to as "Operation Manul".
https://attack.mitre.org/software/S0234
S0234
Bandook
T1095
Non-Application Layer Protocol
Bandook has a command built in to use a raw TCP socket.
Bandook is a commercially available RAT, written in Delphi and C++, that has been available since at least 2007. It has been used against government, financial, energy, healthcare, education, IT, and legal organizations in the US, South America, Europe, and Southeast Asia. Bandook has been used by Dark Caracal, as well as in a separate campaign referred to as "Operation Manul".
https://attack.mitre.org/software/S0234
S0234
Bandook
T1027.003
Obfuscated Files or Information: Steganography
Bandook has used .PNG images within a zip file to build the executable.
Bandook is a commercially available RAT, written in Delphi and C++, that has been available since at least 2007. It has been used against government, financial, energy, healthcare, education, IT, and legal organizations in the US, South America, Europe, and Southeast Asia. Bandook has been used by Dark Caracal, as well as in a separate campaign referred to as "Operation Manul".
https://attack.mitre.org/software/S0234
S0234
Bandook
T1120
Peripheral Device Discovery
Bandook can detect USB devices.
Bandook is a commercially available RAT, written in Delphi and C++, that has been available since at least 2007. It has been used against government, financial, energy, healthcare, education, IT, and legal organizations in the US, South America, Europe, and Southeast Asia. Bandook has been used by Dark Caracal, as well as in a separate campaign referred to as "Operation Manul".
https://attack.mitre.org/software/S0234
S0234
Bandook
T1566.001
Phishing: Spearphishing Attachment
Bandook is delivered via a malicious Word document inside a zip file.
Bandook is a commercially available RAT, written in Delphi and C++, that has been available since at least 2007. It has been used against government, financial, energy, healthcare, education, IT, and legal organizations in the US, South America, Europe, and Southeast Asia. Bandook has been used by Dark Caracal, as well as in a separate campaign referred to as "Operation Manul".
https://attack.mitre.org/software/S0234
S0234
Bandook
T1055.012
Process Injection: Process Hollowing
Bandook has been launched by starting iexplore.exe and replacing it with Bandook's payload.
Bandook is a commercially available RAT, written in Delphi and C++, that has been available since at least 2007. It has been used against government, financial, energy, healthcare, education, IT, and legal organizations in the US, South America, Europe, and Southeast Asia. Bandook has been used by Dark Caracal, as well as in a separate campaign referred to as "Operation Manul".
https://attack.mitre.org/software/S0234
S0234
Bandook
T1113
Screen Capture
Bandook is capable of taking an image of and uploading the current desktop.
Bandook is a commercially available RAT, written in Delphi and C++, that has been available since at least 2007. It has been used against government, financial, energy, healthcare, education, IT, and legal organizations in the US, South America, Europe, and Southeast Asia. Bandook has been used by Dark Caracal, as well as in a separate campaign referred to as "Operation Manul".
https://attack.mitre.org/software/S0234
S0234
Bandook
T1553.002
Subvert Trust Controls: Code Signing
Bandook was signed with valid Certum certificates.
Bandook is a commercially available RAT, written in Delphi and C++, that has been available since at least 2007. It has been used against government, financial, energy, healthcare, education, IT, and legal organizations in the US, South America, Europe, and Southeast Asia. Bandook has been used by Dark Caracal, as well as in a separate campaign referred to as "Operation Manul".
https://attack.mitre.org/software/S0234
S0234
Bandook
T1082
System Information Discovery
Bandook can collect information about the drives available on the system.
Bandook is a commercially available RAT, written in Delphi and C++, that has been available since at least 2007. It has been used against government, financial, energy, healthcare, education, IT, and legal organizations in the US, South America, Europe, and Southeast Asia. Bandook has been used by Dark Caracal, as well as in a separate campaign referred to as "Operation Manul".
https://attack.mitre.org/software/S0234
S0234
Bandook
T1016
System Network Configuration Discovery
Bandook has a command to get the public IP address from a system.
Bandook is a commercially available RAT, written in Delphi and C++, that has been available since at least 2007. It has been used against government, financial, energy, healthcare, education, IT, and legal organizations in the US, South America, Europe, and Southeast Asia. Bandook has been used by Dark Caracal, as well as in a separate campaign referred to as "Operation Manul".
https://attack.mitre.org/software/S0234
S0234
Bandook
T1204.002
User Execution: Malicious File
Bandook has used lure documents to convince the user to enable macros.
Bandook is a commercially available RAT, written in Delphi and C++, that has been available since at least 2007. It has been used against government, financial, energy, healthcare, education, IT, and legal organizations in the US, South America, Europe, and Southeast Asia. Bandook has been used by Dark Caracal, as well as in a separate campaign referred to as "Operation Manul".
https://attack.mitre.org/software/S0234
S0234
Bandook
T1125
Video Capture
Bandook has modules that are capable of capturing video from a victim's webcam.
Bandook is a commercially available RAT, written in Delphi and C++, that has been available since at least 2007. It has been used against government, financial, energy, healthcare, education, IT, and legal organizations in the US, South America, Europe, and Southeast Asia. Bandook has been used by Dark Caracal, as well as in a separate campaign referred to as "Operation Manul".
https://attack.mitre.org/software/S0234
S0239
Bankshot
T1134.002
Access Token Manipulation: Create Process with Token
Bankshot grabs a user token using WTSQueryUserToken and then creates a process by impersonating a logged-on user.
Bankshot is a remote access tool (RAT) that was first reported by the Department of Homeland Security in December of 2017. In 2018, Lazarus Group used the Bankshot implant in attacks against the Turkish financial sector.
https://attack.mitre.org/software/S0239
S0239
Bankshot
T1087.001
Account Discovery: Local Account
Bankshot gathers domain and account names/information through process monitoring.
Bankshot is a remote access tool (RAT) that was first reported by the Department of Homeland Security in December of 2017. In 2018, Lazarus Group used the Bankshot implant in attacks against the Turkish financial sector.
https://attack.mitre.org/software/S0239
S0239
Bankshot
.002
Account Discovery: Domain Account
Bankshot gathers domain and account names/information through process monitoring.
Bankshot is a remote access tool (RAT) that was first reported by the Department of Homeland Security in December of 2017. In 2018, Lazarus Group used the Bankshot implant in attacks against the Turkish financial sector.
https://attack.mitre.org/software/S0239
S0239
Bankshot
T1071.001
Application Layer Protocol: Web Protocols
Bankshot uses HTTP for command and control communication.
Bankshot is a remote access tool (RAT) that was first reported by the Department of Homeland Security in December of 2017. In 2018, Lazarus Group used the Bankshot implant in attacks against the Turkish financial sector.
https://attack.mitre.org/software/S0239
S0239
Bankshot
T1119
Automated Collection
Bankshot recursively generates a list of files within a directory and sends them back to the control server.
Bankshot is a remote access tool (RAT) that was first reported by the Department of Homeland Security in December of 2017. In 2018, Lazarus Group used the Bankshot implant in attacks against the Turkish financial sector.
https://attack.mitre.org/software/S0239
S0239
Bankshot
T1059.003
Command and Scripting Interpreter: Windows Command Shell
Bankshot uses the command-line interface to execute arbitrary commands.
Bankshot is a remote access tool (RAT) that was first reported by the Department of Homeland Security in December of 2017. In 2018, Lazarus Group used the Bankshot implant in attacks against the Turkish financial sector.
https://attack.mitre.org/software/S0239
S0239
Bankshot
T1543.003
Create or Modify System Process: Windows Service
Bankshot can terminate a specific process by its process id.
Bankshot is a remote access tool (RAT) that was first reported by the Department of Homeland Security in December of 2017. In 2018, Lazarus Group used the Bankshot implant in attacks against the Turkish financial sector.
https://attack.mitre.org/software/S0239
S0239
Bankshot
T1132.002
Data Encoding: Non-Standard Encoding
Bankshot encodes commands from the control server using a range of characters and gzip.
Bankshot is a remote access tool (RAT) that was first reported by the Department of Homeland Security in December of 2017. In 2018, Lazarus Group used the Bankshot implant in attacks against the Turkish financial sector.
https://attack.mitre.org/software/S0239
S0239
Bankshot
T1005
Data from Local System
Bankshot collects files from the local system.
Bankshot is a remote access tool (RAT) that was first reported by the Department of Homeland Security in December of 2017. In 2018, Lazarus Group used the Bankshot implant in attacks against the Turkish financial sector.
https://attack.mitre.org/software/S0239
S0239
Bankshot
T1001.003
Data Obfuscation: Protocol or Service Impersonation
Bankshot generates a false TLS handshake using a public certificate to disguise C2 network communications.
Bankshot is a remote access tool (RAT) that was first reported by the Department of Homeland Security in December of 2017. In 2018, Lazarus Group used the Bankshot implant in attacks against the Turkish financial sector.
https://attack.mitre.org/software/S0239
S0239
Bankshot
T1140
Deobfuscate/Decode Files or Information
Bankshot decodes embedded XOR strings.
Bankshot is a remote access tool (RAT) that was first reported by the Department of Homeland Security in December of 2017. In 2018, Lazarus Group used the Bankshot implant in attacks against the Turkish financial sector.
https://attack.mitre.org/software/S0239
S0239
Bankshot
T1041
Exfiltration Over C2 Channel
Bankshot exfiltrates data over its C2 channel.
Bankshot is a remote access tool (RAT) that was first reported by the Department of Homeland Security in December of 2017. In 2018, Lazarus Group used the Bankshot implant in attacks against the Turkish financial sector.
https://attack.mitre.org/software/S0239
S0239
Bankshot
T1203
Exploitation for Client Execution
Bankshot leverages a known zero-day vulnerability in Adobe Flash to execute the implant into the victims’ machines.
Bankshot is a remote access tool (RAT) that was first reported by the Department of Homeland Security in December of 2017. In 2018, Lazarus Group used the Bankshot implant in attacks against the Turkish financial sector.
https://attack.mitre.org/software/S0239
S0239
Bankshot
T1083
File and Directory Discovery
Bankshot searches for files on the victim's machine.
Bankshot is a remote access tool (RAT) that was first reported by the Department of Homeland Security in December of 2017. In 2018, Lazarus Group used the Bankshot implant in attacks against the Turkish financial sector.
https://attack.mitre.org/software/S0239
S0239
Bankshot
T1070
Indicator Removal
Bankshot deletes all artifacts associated with the malware from the infected machine.
Bankshot is a remote access tool (RAT) that was first reported by the Department of Homeland Security in December of 2017. In 2018, Lazarus Group used the Bankshot implant in attacks against the Turkish financial sector.
https://attack.mitre.org/software/S0239
S0239
Bankshot
.004
File Deletion
Bankshot marks files to be deleted upon the next system reboot and uninstalls and removes itself from the system.
Bankshot is a remote access tool (RAT) that was first reported by the Department of Homeland Security in December of 2017. In 2018, Lazarus Group used the Bankshot implant in attacks against the Turkish financial sector.
https://attack.mitre.org/software/S0239
S0239
Bankshot
.006
Timestomp
Bankshot modifies the time of a file as specified by the control server.
Bankshot is a remote access tool (RAT) that was first reported by the Department of Homeland Security in December of 2017. In 2018, Lazarus Group used the Bankshot implant in attacks against the Turkish financial sector.
https://attack.mitre.org/software/S0239
S0239
Bankshot
T1105
Ingress Tool Transfer
Bankshot uploads files and secondary payloads to the victim's machine.
Bankshot is a remote access tool (RAT) that was first reported by the Department of Homeland Security in December of 2017. In 2018, Lazarus Group used the Bankshot implant in attacks against the Turkish financial sector.
https://attack.mitre.org/software/S0239
S0239
Bankshot
T1112
Modify Registry
Bankshot writes data into the Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Pniumj.
Bankshot is a remote access tool (RAT) that was first reported by the Department of Homeland Security in December of 2017. In 2018, Lazarus Group used the Bankshot implant in attacks against the Turkish financial sector.
https://attack.mitre.org/software/S0239
S0239
Bankshot
T1106
Native API
Bankshot creates processes using the Windows API calls: CreateProcessA() and CreateProcessAsUserA().
Bankshot is a remote access tool (RAT) that was first reported by the Department of Homeland Security in December of 2017. In 2018, Lazarus Group used the Bankshot implant in attacks against the Turkish financial sector.
https://attack.mitre.org/software/S0239
S0239
Bankshot
T1571
Non-Standard Port
Bankshot binds and listens on port 1058 for HTTP traffic while also utilizing a FakeTLS method.
Bankshot is a remote access tool (RAT) that was first reported by the Department of Homeland Security in December of 2017. In 2018, Lazarus Group used the Bankshot implant in attacks against the Turkish financial sector.
https://attack.mitre.org/software/S0239
S0239
Bankshot
T1057
Process Discovery
Bankshot identifies processes and collects the process ids.
Bankshot is a remote access tool (RAT) that was first reported by the Department of Homeland Security in December of 2017. In 2018, Lazarus Group used the Bankshot implant in attacks against the Turkish financial sector.
https://attack.mitre.org/software/S0239