S0006 pwdump
pwdump is a credential dumper. 1
| Item | Value | 
|---|---|
| ID | S0006 | 
| Associated Names | |
| Type | TOOL | 
| Version | 1.1 | 
| Created | 31 May 2017 | 
| Last Modified | 13 August 2020 | 
| Navigation Layer | View In ATT&CK® Navigator | 
Techniques Used
| Domain | ID | Name | Use | 
|---|---|---|---|
| enterprise | T1003 | OS Credential Dumping | - | 
| enterprise | T1003.002 | Security Account Manager | pwdump can be used to dump credentials from the SAM.1 | 
Groups That Use This Software
| ID | Name | References | 
|---|---|---|
| G0096 | APT41 | 2 | 
| G0053 | FIN5 | 3 | 
| G0087 | APT39 | 4 | 
| G0027 | Threat Group-3390 | 5 | 
| G0006 | APT1 | 6 | 
| G0045 | menuPass | 7 | 
References
- 
Wikipedia. (2007, August 9). pwdump. Retrieved June 22, 2016. ↩↩ 
- 
Fraser, N., et al. (2019, August 7). Double DragonAPT41, a dual espionage and cyber crime operation APT41. Retrieved September 23, 2019. ↩ 
- 
Bromiley, M. and Lewis, P. (2016, October 7). Attacking the Hospitality and Gaming Industries: Tracking an Attacker Around the World in 7 Years. Retrieved October 6, 2017. ↩ 
- 
Symantec. (2018, February 28). Chafer: Latest Attacks Reveal Heightened Ambitions. Retrieved May 22, 2020. ↩ 
- 
Falcone, R. and Lancaster, T. (2019, May 28). Emissary Panda Attacks Middle East Government Sharepoint Servers. Retrieved July 9, 2019. ↩ 
- 
Mandiant. (n.d.). APT1 Exposing One of China’s Cyber Espionage Units. Retrieved July 18, 2016. ↩ 
- 
PwC and BAE Systems. (2017, April). Operation Cloud Hopper: Technical Annex. Retrieved April 13, 2017. ↩