ETDA สำนักงานพัฒนาธุรกรรมทางอิเล็กทรอนิกส์
Electronic Transactions Development Agency
Report
Search
Home > List all groups > List all tools > List all groups using tool HenBox

Threat Group Cards: A Threat Actor Encyclopedia

Permanent link Tool: HenBox

NamesHenBox
CategoryMalware
TypeInfo stealer
Description(Palo Alto) Once installed, HenBox steals information from the devices from a myriad of sources, including many mainstream chat, communication, and social media apps. The stolen information includes personal and device information. Of note, in addition to tracking the compromised device’s location, HenBox also harvests all outgoing phone numbers with an “86” prefix, which is the country code for the People’s Republic of China (PRC). It can also access the phone’s cameras and microphone.
Information<https://unit42.paloaltonetworks.com/unit42-henbox-chickens-come-home-roost/>
MITRE ATT&CK<https://attack.mitre.org/software/S0544/>
Malpedia<https://malpedia.caad.fkie.fraunhofer.de/details/apk.henbox>
AlienVault OTX<https://otx.alienvault.com/browse/pulses?q=tag:HenBox>

Last change to this tool card: 30 December 2022

Download this tool card in JSON format

All groups using tool HenBox

ChangedNameCountryObserved

APT groups

 Ke3chang, Vixen Panda, APT 15, GREF, Playful DragonChina2010-Late 2022 
XMustang Panda, Bronze PresidentChina2012-Mar 2024 

2 groups listed (2 APT, 0 other, 0 unknown)

Digital Service Security Center
Electronic Transactions Development Agency

Follow us on

Facebook Twitter

Report incidents

Telephone +66 (0)2-123-1227
E-mail [email protected]