ThaiCERT    ETDA    MDES
Report
Search
Home > List all groups > List all tools > List all groups using tool Mimikatz

Threat Group Cards: A Threat Actor Encyclopedia

Permanent link Tool: Mimikatz

NamesMimikatz
CategoryTools
TypeCredential stealer, Keylogger
Description(SANS) Mimikatz provides a wealth of tools for collecting and making use of Windows credentials on target systems, including retrieval of cleartext passwords, Lan Manager hashes, and NTLM hashes, certificates, and Kerberos tickets. The tools run with varying success on all versions of Windows from XP forward, with functionality somewhat limited in Windows 8.1 and later.
Information<https://github.com/gentilkiwi/mimikatz>
<https://www.sans.org/reading-room/whitepapers/intrusion/mimikatz-overview-defenses-detection-36780>
<https://www.wired.com/story/how-mimikatz-became-go-to-hacker-tool/>
<https://www.crowdstrike.com/blog/credential-theft-mimikatz-techniques/>
MITRE ATT&CK<https://attack.mitre.org/software/S0002/>
Malpedia<https://malpedia.caad.fkie.fraunhofer.de/details/win.mimikatz>
AlienVault OTX<https://otx.alienvault.com/browse/pulses?q=tag:mimikatz>

Last change to this tool card: 13 May 2020

Download this tool card in JSON format

Previous: Milum
Next: MINEBRIDGE

All groups using tool Mimikatz

ChangedNameCountryObserved

APT groups

 APT 20, Violin PandaChina2014-2017 
 APT 29, Cozy Bear, The DukesRussia2008-Jul 2021 HOTX
 APT 32, OceanLotus, SeaLotusVietnam2013-Dec 2020X
 APT 33, Elfin, MagnalliumIran2013-Nov 2019 
 APT 41China2012-Jul 2021 HOTX
 AVIVOREChina2015 
 BackdoorDiplomacy[Unknown]2017 
 Boss Spider, Gold LowellIran2015-Nov 2018X
 Bronze Butler, Tick, RedBaldNight, Stalker PandaChina2010-Apr 2021X
 CalypsoChina2016-Mar 2021 
 Carbanak, AnunakUkraine2013-Aug 2021 HOTX
 Chafer, APT 39Iran2014-Sep 2020X
 Cobalt GroupRussia2016-Oct 2019X
 Comment Crew, APT 1China2006-May 2018X
 DarkHydrus, LazyMeerkatIran2016-Jan 2019 
 Emissary Panda, APT 27, LuckyMouse, Bronze UnionChina2010-Mar 2021 
 FIN6, Skeleton Spider[Unknown]2015-Mar 2020 
 FIN7Russia2013-Jun 2021 HOTX
 GalliumChina2018 
 Hurricane PandaChina2013-Mar 2014 
 IAmTheKingRussia2018 
 Indrik SpiderRussia2014-Jun 2021 HOTX
 Ke3chang, Vixen Panda, APT 15, GREF, Playful DragonChina2010-May 2020 
 Kimsuky, Velvet ChollimaNorth Korea2012-May 2021X
 Lazarus Group, Hidden Cobra, Labyrinth ChollimaNorth Korea2007-Spring 2021X
 Leafminer, RaspiteIran2017 
 Lotus Blossom, Spring Dragon, ThripChina2012-Jun 2018 
 Magic Hound, APT 35, Cobalt Gypsy, Charming KittenIran2013-Jan 2021X
 Mallard Spider[Unknown]2008-Dec 2020 
 MikroceenChina2017-Mar 2021 
 MuddyWater, Seedworm, TEMP.Zagros, Static KittenIran2017-Feb 2021X
 OilRig, APT 34, Helix Kitten, ChryseneIran2014-Jan 2021X
 Operation SignSight[Unknown]2020 
 PittyTiger, Pitty PandaChina2011-2014 
 Sofacy, APT 28, Fancy Bear, SednitRussia2004-Jun 2021 HOTX
 Stone Panda, APT 10, menuPassChina2006-Feb 2021X
 TA2101, Maze Team[Unknown]2019-Mar 2021X
 TaskMastersChina2010-May 2021 
 TEMP.VelesRussia2014-Feb 2019 
 Tonto Team, HartBeat, Karma PandaChina2009-Mar 2021 
 Traveling Spider[Unknown]2019-Mar 2021 
 Turla, Waterbug, Venomous BearRussia1996-Feb 2021 
 UNC2447[Unknown]2020 
 WassoniteNorth Korea2018-Oct 2019 
 Whitefly, Mofang[Unknown]2012-Jul 2018 

Other groups

 Parinacota[Unknown]2018 

46 groups listed (45 APT, 1 other, 0 unknown)

Thailand Computer Emergency Response Team (ThaiCERT)
Electronic Transactions Development Agency

Follow us on

Facebook Twitter

Report incidents

Telephone +66 (0)2-123-1234
E-mail report@thaicert.or.th
PGP Download PGP key