Sponsored by Hudson Rock – Use Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are impacting your business
Victims count: 455
Last discovered victim 2025-02-01
First discovered victims: 2023-05-23
Discovery | RMM Tools | Defense Evasion | Credential Theft | OffSec | Networking | LOLBAS | Exfiltration |
---|---|---|---|---|---|---|---|
|
|
GMER
PCHunter
ProcessHacker
|
LaZagne
Mimikatz
NirSoft VNCPassView
NirSoft WebBrowserPassView
PasswordFox
ProcDump
|
|
|
PsExec
|
RClone
|
No vulnerabilities exploited available.
Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Impact |
---|---|---|---|---|---|---|---|---|
Scheduled Task/Job | Scheduled Task/Job | Scheduled Task/Job | Obfuscated Files or Information | OS Credential Dumping | Process Discovery | Taint Shared Content | Data from Local System | Inhibit System Recovery |
Command and Scripting Interpreter | Boot or Logon Autostart Execution | Boot or Logon Autostart Execution | Modify Registry | Input Capture | Network Share Discovery | Data Staged | Data Encrypted for Impact | |
Shared Modules | Registry Run Keys/Startup Folder | Registry Run Keys/Startup Files | Indirect Command Execution | System Information Discovery | Input Capture | Data Destruction | ||
Token Impersonation/Theft | Software Packing | File and Directory Discovery | ||||||
Masquerading | Virtualization/Sandbox Evasion | |||||||
Hidden Files and Directories | Security Software Discovery | |||||||
File Deletion | ||||||||
Virtualization/Sandbox Evasion | ||||||||
Disable or Modify Tools |
No negotiation chats available.
No YARA rules available.