ThaiCERT    ETDA    MDES
Report
Search
Home > List all groups > List all tools > List all groups using tool TidePool

Threat Group Cards: A Threat Actor Encyclopedia

Permanent link Tool: TidePool

NamesTidePool
CategoryMalware
TypeReconnaissance, Backdoor, Info stealer, Exfiltration
Description(Palo Alto) TidePool contains many capabilities common to most RATs. It allows the attacker to read, write and delete files and folders, and run commands over named pipes. TidePool gathers information about the victim’s computer, base64 encodes the data, and sends it to the Command and Control (C2) server via HTTP, which matches capabilities of the BS2005 malware family used by the Ke3chang actor.
Information<https://unit42.paloaltonetworks.com/operation-ke3chang-resurfaces-with-new-tidepool-malware/>
<https://www.fireeye.com/content/dam/fireeye-www/global/en/current-threats/pdfs/wp-operation-ke3chang.pdf>
Malpedia<https://malpedia.caad.fkie.fraunhofer.de/details/win.tidepool>
AlienVault OTX<https://otx.alienvault.com/browse/pulses?q=tag:TidePool>

Last change to this tool card: 14 May 2020

Download this tool card in JSON format

Previous: ThreeDollars
Next: TIDYELF

All groups using tool TidePool

ChangedNameCountryObserved

APT groups

XDragonOKChina2015-Jan 2017 
XKe3chang, Vixen Panda, APT 15, GREF, Playful DragonChina2010-May 2020 

2 groups listed (2 APT, 0 other, 0 unknown)

Thailand Computer Emergency Response Team (ThaiCERT)
Electronic Transactions Development Agency

Follow us on

Facebook Twitter

Report incidents

Telephone +66 (0)2-123-1234
E-mail report@thaicert.or.th
PGP Download PGP key