Description
[PipeMon](https://attack.mitre.org/software/S0501) is a multi-stage modular backdoor used by [Winnti Group](https://attack.mitre.org/groups/G0044).(Citation: ESET PipeMon May 2020)
External References
Techniques Used by This Malware
- T1008 — Fallback Channels
- T1016 — System Network Configuration Discovery
- T1027.011 — Fileless Storage
- T1027.013 — Encrypted/Encoded File
- T1036.005 — Match Legitimate Resource Name or Location
- T1055.001 — Dynamic-link Library Injection
- T1057 — Process Discovery
- T1082 — System Information Discovery
- T1095 — Non-Application Layer Protocol
- T1105 — Ingress Tool Transfer
- T1106 — Native API
- T1112 — Modify Registry
- T1124 — System Time Discovery
- T1129 — Shared Modules
- T1134.002 — Create Process with Token
- T1134.004 — Parent PID Spoofing
- T1140 — Deobfuscate/Decode Files or Information
- T1518.001 — Security Software Discovery
- T1543.003 — Windows Service
- T1547.012 — Print Processors
- T1548.002 — Bypass User Account Control
- T1553.002 — Code Signing
- T1573.001 — Symmetric Cryptography