Adversaries may buy, steal, or download software tools that can be used during targeting. Tools can be open or closed source, free or commercial. A tool can be used for malicious purposes by an adversary, but (unlike malware) were not intended to be used for those purposes (ex: PsExec). Tool acquisition can involve the procurement of commercial software licenses, including for red teaming tools such as Cobalt Strike. Commercial software may be obtained through purchase, stealing licenses (or licensed copies of the software), or cracking trial versions.[1]
Adversaries may obtain tools to support their operations, including to support execution of post-compromise behaviors. In addition to freely downloading or purchasing software, adversaries may steal software and/or software licenses from third-party entities (including other adversaries).
ID | Name | Description |
---|---|---|
G1007 | Aoqin Dragon |
Aoqin Dragon obtained the Heyoka open source exfiltration tool and subsequently modified it for their operations.[2] |
G0099 | APT-C-36 |
APT-C-36 obtained and used a modified variant of Imminent Monitor.[3] |
G0006 | APT1 |
APT1 has used various open-source tools for privilege escalation purposes.[4] |
G0073 | APT19 |
APT19 has obtained and used publicly-available tools like Empire.[5][6] |
G0007 | APT28 |
APT28 has obtained and used open-source tools like Koadic, Mimikatz, and Responder.[7][8][9] |
G0016 | APT29 |
APT29 has obtained and used a variety of tools including Mimikatz, SDelete, Tor, meek, and Cobalt Strike.[10][11][12] |
G0050 | APT32 |
APT32 has obtained and used tools such as Mimikatz and Cobalt Strike, and a variety of other open-source tools from GitHub.[13][14] |
G0064 | APT33 |
APT33 has obtained and leveraged publicly-available tools for early intrusion activities.[15][16] |
G0082 | APT38 |
APT38 has obtained and used open-source tools such as Mimikatz.[17] |
G0087 | APT39 |
APT39 has modified and used customized versions of publicly-available tools like PLINK and Mimikatz.[18][19] |
G0096 | APT41 |
APT41 has obtained and used tools such as Mimikatz, pwdump, PowerSploit, and Windows Credential Editor.[20] |
G0143 | Aquatic Panda |
Aquatic Panda has acquired and used Cobalt Strike in its operations.[21] |
G0135 | BackdoorDiplomacy |
BackdoorDiplomacy has obtained a variety of open-source reconnaissance and red team tools for discovery and lateral movement.[22] |
G1002 | BITTER |
BITTER has obtained tools such as PuTTY for use in their operations.[23] |
G0098 | BlackTech |
BlackTech has obtained and used tools such as Putty, SNScan, and PsExec for its operations.[24] |
G0108 | Blue Mockingbird |
Blue Mockingbird has obtained and used tools such as Mimikatz.[25] |
G0060 | BRONZE BUTLER |
BRONZE BUTLER has obtained and used open-source tools such as Mimikatz, gsecdump, and Windows Credential Editor.[26] |
C0010 | C0010 |
For C0010, UNC3890 actors obtained multiple publicly-available tools, including METASPLOIT, UNICORN, and NorthStar C2.[27] |
C0015 | C0015 |
For C0015, the threat actors obtained a variety of tools, including AdFind, AnyDesk, and Process Hacker.[28] |
C0017 | C0017 |
For C0017, APT41 obtained publicly available tools such as YSoSerial.NET, ConfuserEx, and BadPotato.[29] |
C0018 | C0018 |
For C0018, the threat actors acquired a variety of open source tools, including Mimikatz, Sliver, SoftPerfect Network Scanner, AnyDesk, and PDQ Deploy.[30][31] |
C0021 | C0021 |
For C0021, the threat actors used Cobalt Strike configured with a modified variation of the publicly available Pandora Malleable C2 Profile.[32][33] |
C0027 | C0027 |
During C0027, Scattered Spider obtained and used multiple tools including the LINpeas privilege escalation utility, aws_consoler, rsocx reverse proxy, Level RMM tool, and RustScan port scanner.[34] |
C0032 | C0032 |
During the C0032 campaign, TEMP.Veles obtained and used tools such as Mimikatz and PsExec.[35] |
G0008 | Carbanak |
Carbanak has obtained and used open-source tools such as PsExec and Mimikatz.[36] |
G0114 | Chimera |
Chimera has obtained and used tools such as BloodHound, Cobalt Strike, Mimikatz, and PsExec.[37][38] |
G1021 | Cinnamon Tempest |
Cinnamon Tempest has used open-source tools including customized versions of the Iox proxy tool, NPS tunneling tool, Meterpreter, and a keylogger that uploads data to Alibaba cloud storage.[39][40] |
G0003 | Cleaver |
Cleaver has obtained and used open-source tools such as PsExec, Windows Credential Editor, and Mimikatz.[41] |
G0080 | Cobalt Group |
Cobalt Group has obtained and used a variety of tools including Mimikatz, PsExec, Cobalt Strike, and SDelete.[42] |
G0052 | CopyKittens |
CopyKittens has used Metasploit, Empire, and AirVPN for post-exploitation activities.[43][44] |
C0004 | CostaRicto |
During CostaRicto, the threat actors obtained open source tools to use in their operations.[45] |
C0029 | Cutting Edge |
During Cutting Edge, threat actors leveraged tools including Interactsh to identify vulnerable targets, PySoxy to simultaneously dispatch traffic between multiple endpoints, BusyBox to enable post exploitation activities, and Kubo Injector to inject shared objects into process memory.[46][47] |
G0079 | DarkHydrus |
DarkHydrus has obtained and used tools such as Mimikatz, Empire, and Cobalt Strike.[48] |
G0105 | DarkVishnya |
DarkVishnya has obtained and used tools such as Impacket, Winexe, and PsExec.[49] |
G0035 | Dragonfly |
Dragonfly has obtained and used tools such as Mimikatz, CrackMapExec, and PsExec.[50] |
G1006 | Earth Lusca |
Earth Lusca has acquired and used a variety of open source tools.[51] |
G0137 | Ferocious Kitten |
Ferocious Kitten has obtained open source tools for its operations, including JsonCPP and Psiphon.[52] |
G0051 | FIN10 |
FIN10 has relied on publicly-available software to gain footholds and establish persistence in victim environments.[53] |
G1016 | FIN13 |
FIN13 has utilized publicly available tools such as Mimikatz, Impacket, PWdump7, ProcDump, Nmap, and Incognito V2 for targeting efforts.[54] |
G0053 | FIN5 |
FIN5 has obtained and used a customized version of PsExec, as well as use other tools such as pwdump, SDelete, and Windows Credential Editor.[55] |
G0037 | FIN6 |
FIN6 has obtained and used tools such as Mimikatz, Cobalt Strike, and AdFind.[56][57] |
G0046 | FIN7 |
FIN7 has utilized a variety of tools such as Cobalt Strike, PowerSploit, and the remote management tool, Atera for targeting efforts.[58] |
G0061 | FIN8 |
FIN8 has used open-source tools such as Impacket for targeting efforts.[59] |
C0001 | Frankenstein |
For Frankenstein, the threat actors obtained and used Empire.[60] |
C0007 | FunnyDream |
For FunnyDream, the threat actors used a modified version of the open source PcShare remote administration tool.[61] |
G0093 | GALLIUM |
GALLIUM has used a variety of widely-available tools, which in some cases they modified to add functionality and/or subvert antimalware solutions.[62] |
G0047 | Gamaredon Group |
Gamaredon Group has used various legitimate tools, such as |
G0078 | Gorgon Group |
Gorgon Group has obtained and used tools such as QuasarRAT and Remcos.[64] |
G1001 | HEXANE |
HEXANE has acquired, and sometimes customized, open source tools such as Mimikatz, Empire, VNC remote access software, and DIG.net.[65][66][67] |
C0038 | HomeLand Justice |
During HomeLand Justice, threat actors used tools including Advanced Port Scanner, Mimikatz, and Impacket.[68][69] |
G1032 | INC Ransom |
INC Ransom has acquired and used several tools including MegaSync, AnyDesk, esentutl and PsExec.[70][71][72][73][74] |
G0100 | Inception |
Inception has obtained and used open-source tools such as LaZagne.[75] |
G0136 | IndigoZebra |
IndigoZebra has acquired open source tools such as NBTscan and Meterpreter for their operations.[76][77] |
G0004 | Ke3chang | |
G0094 | Kimsuky |
Kimsuky has obtained and used tools such as Nirsoft WebBrowserPassVIew, Mimikatz, and PsExec.[79][80][81] |
G1004 | LAPSUS$ |
LAPSUS$ has obtained tools such as RVTools and AD Explorer for their operations.[82][83] |
G0032 | Lazarus Group |
Lazarus Group has obtained a variety of tools for their operations, including Responder and PuTTy PSCP.[84] |
G0077 | Leafminer |
Leafminer has obtained and used tools such as LaZagne, Mimikatz, PsExec, and MailSniper.[85] |
G1014 | LuminousMoth |
LuminousMoth has obtained an ARP spoofing tool from GitHub.[86] |
G0059 | Magic Hound |
Magic Hound has obtained and used tools like Havij, sqlmap, Metasploit, Mimikatz, and Plink.[87][88][89][90][91] |
G0045 | menuPass |
menuPass has used and modified open-source tools like Impacket, Mimikatz, and pwdump.[92] |
G1013 | Metador |
Metador has used Microsoft's Console Debugger in some of their operations.[93] |
G1009 | Moses Staff |
Moses Staff has used the commercial tool DiskCryptor.[94] |
G0069 | MuddyWater |
MuddyWater has used legitimate tools ConnectWise, RemoteUtilities, and SimpleHelp to gain access to the target environment.[95][96] |
C0002 | Night Dragon |
During Night Dragon, threat actors obtained and used tools such as gsecdump.[97] |
C0012 | Operation CuckooBees |
For Operation CuckooBees, the threat actors obtained publicly-available JSP code that was used to deploy a webshell onto a compromised server.[98] |
C0022 | Operation Dream Job |
For Operation Dream Job, Lazarus Group obtained tools such as Wake-On-Lan, Responder, ChromePass, and dbxcli.[99][100] |
C0005 | Operation Spalax |
For Operation Spalax, the threat actors obtained packers such as CyaX.[101] |
C0014 | Operation Wocao |
For Operation Wocao, the threat actors obtained a variety of open source tools, including JexBoss, KeeThief, and BloodHound.[102] |
G0040 | Patchwork |
Patchwork has obtained and used open-source tools such as QuasarRAT.[103] |
G0011 | PittyTiger |
PittyTiger has obtained and used tools such as Mimikatz and gsecdump.[104] |
G1040 | Play |
Play has used multiple tools for discovery and defense evasion purposes on compromised hosts.[105] |
G1005 | POLONIUM |
POLONIUM has obtained and used tools such as AirVPN and plink in their operations.[44] |
G0034 | Sandworm Team |
Sandworm Team has acquired open-source tools for their operations, including Invoke-PSImage, which was used to establish an encrypted channel from a compromised host to Sandworm Team's C2 server in preparation for the 2018 Winter Olympics attack, as well as Impacket and RemoteExec, which were used in their 2022 Prestige operations.[106][107] Additionally, Sandworm Team has used Empire, Cobalt Strike and PoshC2.[108] |
G0091 | Silence |
Silence has obtained and modified versions of publicly-available tools like Empire and PsExec.[109] [110] |
G0122 | Silent Librarian |
Silent Librarian has obtained free and publicly available tools including SingleFile and HTTrack to copy login pages of targeted organizations.[111][112] |
G1033 | Star Blizzard |
Star Blizzard has incorporated the open-source EvilGinx framework into their spearphishing activity.[113][114] |
G1018 | TA2541 | |
G0092 | TA505 |
TA505 has used a variety of tools in their operations, including AdFind, BloodHound, Mimikatz, and PowerSploit.[116] |
G0027 | Threat Group-3390 |
Threat Group-3390 has obtained and used tools such as Impacket, pwdump, Mimikatz, gsecdump, NBTscan, and Windows Credential Editor.[117][118] |
G0076 | Thrip |
Thrip has obtained and used tools such as Mimikatz and PsExec.[119] |
C0030 | Triton Safety Instrumented System Attack |
In the Triton Safety Instrumented System Attack, TEMP.Veles used tools such as Mimikatz and other open-source software.[120] |
G0010 | Turla |
Turla has obtained and customized publicly-available tools like Mimikatz.[121] |
G1017 | Volt Typhoon |
Volt Typhoon has used legitimate network and forensic tools and customized versions of open-source tools for C2.[122][123] |
G0107 | Whitefly | |
G0090 | WIRTE |
WIRTE has obtained and used Empire for post-exploitation activities.[125] |
G0102 | Wizard Spider |
Wizard Spider has utilized tools such as Empire, Cobalt Strike, Cobalt Strike, Rubeus, AdFind, BloodHound, Metasploit, Advanced IP Scanner, Nirsoft PingInfoView, and SoftPerfect Network Scanner for targeting efforts.[126][127] |
ID | Mitigation | Description |
---|---|---|
M1056 | Pre-compromise |
This technique cannot be easily mitigated with preventive controls since it is based on behaviors performed outside of the scope of enterprise defenses and controls. |
ID | Data Source | Data Component | Detects |
---|---|---|---|
DS0004 | Malware Repository | Malware Metadata |
Monitor for contextual data about a malicious payload, such as compilation times, file hashes, as well as watermarks or other identifiable configuration information. In some cases, malware repositories can also be used to identify features of tool use associated with an adversary, such as watermarks in Cobalt Strike payloads.[128]Much of this activity will take place outside the visibility of the target organization, making detection of this behavior difficult. Detection efforts may be focused on post-compromise phases of the adversary lifecycle. |