ETDA สำนักงานพัฒนาธุรกรรมทางอิเล็กทรอนิกส์
Electronic Transactions Development Agency
Home > List all groups > List all tools > List all groups using tool BIOLOAD

Threat Group Cards: A Threat Actor Encyclopedia

Permanent link Tool: BIOLOAD

Description(Fortinet) The loader file name is WinBio.dll (note the uppercase characters) and is placed by the attacker alongside the executable in the same folder ('WinBioPlugIns'), thus leveraging the default DLL search order. Because the file path is under %WINDIR%, it means that in order to plant it the attacker needed to have elevated privileges on the victim’s machine such as administrator or a SYSTEM account.

Like Boostwrite, this loader was also developed in C++. It exports only a single function which is the one FaceFodUninstaller.exe imports.
AlienVault OTX<>

Last change to this tool card: 24 April 2021

Download this tool card in JSON format

All groups using tool BIOLOAD


APT groups

 FIN7Russia2013-Jan 2022X

1 group listed (1 APT, 0 other, 0 unknown)

Digital Service Security Center
Electronic Transactions Development Agency

Follow us on

Facebook Twitter

Report incidents

Telephone +66 (0)2-123-1227
E-mail [email protected]