ThaiCERT    ETDA    MDES
Report
Search
Home > List all groups > List all tools > List all groups using tool PLEAD

Threat Group Cards: A Threat Actor Encyclopedia

Permanent link Tool: PLEAD

NamesPLEAD
TSCookie
CategoryMalware
TypeReconnaissance, Backdoor, Info stealer, Credential stealer, Exfiltration
Description(Trend Micro) PLEAD’s backdoor can:

• Harvest saved credentials from browsers and email clients like Outlook
• List drives, processes, open windows, and files
• Open remote Shell
• Upload target file
• Execute applications via ShellExecute API
• Delete target file
Information<https://blog.trendmicro.com/trendlabs-security-intelligence/following-trail-blacktech-cyber-espionage-campaigns/>
<http://blog.jpcert.or.jp/2018/03/malware-tscooki-7aa0.html>
<https://blog.jpcert.or.jp/2018/06/plead-downloader-used-by-blacktech.html>
<https://blogs.jpcert.or.jp/en/2018/11/tscookie2.html>
<http://www.freebuf.com/column/159865.html>
<https://www.welivesecurity.com/2018/07/09/certificates-stolen-taiwanese-tech-companies-plead-malware-campaign/>
<https://documents.trendmicro.com/assets/appendix-following-the-trail-of-blacktechs-cyber-espionage-campaigns.pdf>
Malpedia<https://malpedia.caad.fkie.fraunhofer.de/details/win.plead>
<https://malpedia.caad.fkie.fraunhofer.de/details/elf.tscookie>
AlienVault OTX<https://otx.alienvault.com/browse/pulses?q=tag:PLEAD>

Last change to this tool card: 13 May 2020

Download this tool card in JSON format

Previous: PLAINTEE
Next: Plink

All groups using tool PLEAD

ChangedNameCountryObserved

APT groups

 BlackTech, Circuit Panda, Radio PandaChina2010-2020 

1 group listed (1 APT, 0 other, 0 unknown)

Thailand Computer Emergency Response Team (ThaiCERT)
Electronic Transactions Development Agency

Follow us on

Facebook Twitter

Report incidents

Telephone +66 (0)2-123-1234
E-mail report@thaicert.or.th
PGP Download PGP key