ETDA สำนักงานพัฒนาธุรกรรมทางอิเล็กทรอนิกส์
Electronic Transactions Development Agency
Report
Search
Home > List all groups > List all tools > List all groups using tool PLEAD

Threat Group Cards: A Threat Actor Encyclopedia

Permanent link Tool: PLEAD

NamesPLEAD
DRAWDOWN
GOODTIMES
Linopid
TSCookie
CategoryMalware
TypeReconnaissance, Backdoor, Info stealer, Credential stealer, Exfiltration
Description(Trend Micro) PLEAD’s backdoor can:

• Harvest saved credentials from browsers and email clients like Outlook
• List drives, processes, open windows, and files
• Open remote Shell
• Upload target file
• Execute applications via ShellExecute API
• Delete target file
Information<https://blog.trendmicro.com/trendlabs-security-intelligence/following-trail-blacktech-cyber-espionage-campaigns/>
<http://blog.jpcert.or.jp/2018/03/malware-tscooki-7aa0.html>
<https://blog.jpcert.or.jp/2018/06/plead-downloader-used-by-blacktech.html>
<https://blogs.jpcert.or.jp/en/2018/11/tscookie2.html>
<http://www.freebuf.com/column/159865.html>
<https://www.welivesecurity.com/2018/07/09/certificates-stolen-taiwanese-tech-companies-plead-malware-campaign/>
<https://documents.trendmicro.com/assets/appendix-following-the-trail-of-blacktechs-cyber-espionage-campaigns.pdf>
MITRE ATT&CK<https://attack.mitre.org/software/S0435/>
Malpedia<https://malpedia.caad.fkie.fraunhofer.de/details/win.plead>
<https://malpedia.caad.fkie.fraunhofer.de/details/elf.tscookie>
AlienVault OTX<https://otx.alienvault.com/browse/pulses?q=tag:PLEAD>

Last change to this tool card: 30 December 2022

Download this tool card in JSON format

Previous: PLANKWALK
Next: Plink

All groups using tool PLEAD

ChangedNameCountryObserved

APT groups

 BlackTech, Circuit Panda, Radio PandaChina2010-Oct 2020 

1 group listed (1 APT, 0 other, 0 unknown)

Digital Service Security Center
Electronic Transactions Development Agency

Follow us on

Facebook Twitter

Report incidents

Telephone +66 (0)2-123-1227
E-mail [email protected]