

ACAD/Medre.A has the capability to be used for industrial espionage.Īction RAT is a remote access tool written in Delphi that has been used by SideCopy since at least December 2021 against Indian and Afghani government personnel.Īdbupd is a backdoor used by PLATINUM that is similar to Dipsind.ĪdFind is a free command-line query tool that can be used for gathering information from Active Directory.Īdups is software that was pre-installed onto Android devices, including those made by BLU Products. The worm collects AutoCAD files with drawings. The tool is publicly available on GitHub.ĪBK is a downloader that has been used by BRONZE BUTLER since at least 2019.ĪCAD/Medre.A is a worm that steals operational information. Examples include PlugX, CHOPSTICK, etc.ģPARA RAT is a remote access tool (RAT) programmed in C++ that has been used by Putter Panda.ĤH RAT is malware that has been used by Putter Panda since at least 2007.ĪADInternals is a PowerShell-based framework for administering, enumerating, and exploiting Azure Active Directory.
Music tag editor virus scanner windows#
Examples include PsExec, Metasploit, Mimikatz, as well as Windows utilities such as Net, netstat, Tasklist, etc. This category includes both software that generally is not found on an enterprise system as well as software generally available as part of an operating system that is already present in an environment.

Tool - Commercial, open-source, built-in, or publicly available software that could be used by a defender, pen tester, red teamer, or an adversary.The information provided does not represent all possible technique use by a piece of Software, but ratherĪ subset that is available solely through open source reporting.

To Groups who have been reported to use that Software. Software entries include publicly reported technique use or capability to use a technique and may be mapped “Associated Software” on each page (formerly labeled “Aliases”), because we believe these overlaps are useful for analyst awareness. The team makes a best effort to track overlaps between names based on publicly reported associations, which are designated as Tracking the same set of software by different names. Some instances of software have multiple names associated with the same instance due to various organizations Or other tools used to conduct behavior modeled in ATT&CK. Software is a generic term for custom or commercial code, operating system utilities, open-source software,
