ETDA สำนักงานพัฒนาธุรกรรมทางอิเล็กทรอนิกส์
Electronic Transactions Development Agency
Report
Search
Home > List all groups > List all tools > List all groups using tool TidePool

Threat Group Cards: A Threat Actor Encyclopedia

Permanent link Tool: TidePool

NamesTidePool
CategoryMalware
TypeReconnaissance, Backdoor, Info stealer, Exfiltration
Description(Palo Alto) TidePool contains many capabilities common to most RATs. It allows the attacker to read, write and delete files and folders, and run commands over named pipes. TidePool gathers information about the victim’s computer, base64 encodes the data, and sends it to the Command and Control (C2) server via HTTP, which matches capabilities of the BS2005 malware family used by the Ke3chang actor.
Information<https://unit42.paloaltonetworks.com/operation-ke3chang-resurfaces-with-new-tidepool-malware/>
<https://www.fireeye.com/content/dam/fireeye-www/global/en/current-threats/pdfs/wp-operation-ke3chang.pdf>
Malpedia<https://malpedia.caad.fkie.fraunhofer.de/details/win.tidepool>
AlienVault OTX<https://otx.alienvault.com/browse/pulses?q=tag:TidePool>

Last change to this tool card: 14 May 2020

Download this tool card in JSON format

Previous: Tickler
Next: TIDYELF

All groups using tool TidePool

ChangedNameCountryObserved

APT groups

 DragonOKChina2015-Jan 2017 
 Ke3chang, Vixen Panda, APT 15, GREF, Playful DragonChina2010-Late 2022 

2 groups listed (2 APT, 0 other, 0 unknown)

Digital Service Security Center
Electronic Transactions Development Agency

Follow us on

Facebook Twitter

Report incidents

Telephone +66 (0)2-123-1227
E-mail [email protected]