Names | Pitty PittyTiger RAT | |
Category | Malware | |
Type | Backdoor, Info stealer | |
Description | (Airbus) This RAT is the origin of the attackers’ group name. “PittyTiger” is a mutex used by the malware. “Pitty Tiger” is also a string transmitted in the network communications of the RAT. The following commands are implemented: • File Download (get) and Upload (put) • Screen Capture 8bit (prtsc) and 16bit (prtsc2) • Remote Shell (ocmd/ccmd) • Configuration update (setserv/freshserv) • Direct command execution | |
Information | <https://paper.seebug.org/papers/APT/APT_CyberCriminal_Campagin/2014/2014.07.11.Pitty_Tiger/Pitty_Tiger_Final_Report.pdf> <https://securingtomorrow.mcafee.com/mcafee-labs/targeted-attacks-on-french-company-exploit-multiple-word-vulnerabilities/> | |
Malpedia | <https://malpedia.caad.fkie.fraunhofer.de/details/win.pittytiger_rat> |
Last change to this tool card: 14 May 2020
Download this tool card in JSON format
Previous: Pisloader
Next: Pitvotnacci
Changed | Name | Country | Observed | ||
APT groups | |||||
PittyTiger, Pitty Panda | 2011-2014 |
1 group listed (1 APT, 0 other, 0 unknown)
Digital Service Security Center Follow us on |
Report incidents |
|
+66 (0)2-123-1227 | ||
[email protected] |