ETDA สำนักงานพัฒนาธุรกรรมทางอิเล็กทรอนิกส์
Electronic Transactions Development Agency
Home > List all groups > List all tools > List all groups using tool WMI Ghost

Threat Group Cards: A Threat Actor Encyclopedia

Permanent link Tool: WMI Ghost

NamesWMI Ghost
TypeBackdoor, Exfiltration
Description(Trend Micro) The malware used in the Luckycat campaign, detected by Trend Micro as TROJ_WIMMIE or VBS_WIMMIE, connects to a C&C server via HTTP over port 80. It is notable because it uses Windows Management Instrumentation (WMI) to establish persistence. VBS_WIMMIE registers a script that works as a backdoor to the WMI event handler and deletes files associated with it or TROJ_WIMMIE. As a result, the backdoor cannot be detected by antivirus software through simple file scanning.The compromised computer posts data to a PHP script that runs on the C&C server, usually count.php.

The initial communication results in the creation of a file on the C&C server that contains information on the compromised computer. Although the file is empty, the file name contains the hostname of the compromised computer, followed by its MAC address, along with the campaign code the attackers use to identify which malware attack caused the compromise:

The attacker then creates a file with a name that ends in @.c, which contains a command.

The compromised computer then downloads the file and executes the specified command, which may include any of the following:
• Get external IP address
• Execute shell command
• Download file
• Upload file

The compromised computer then sends the output to the C&C server and deletes the command file.

Last change to this tool card: 14 May 2020

Download this tool card in JSON format

All groups using tool WMI Ghost


APT groups

 Lotus Blossom, Spring Dragon, ThripChina2012-Jun 2018 
 Lucky CatChina2011 

2 groups listed (2 APT, 0 other, 0 unknown)

Digital Service Security Center
Electronic Transactions Development Agency

Follow us on

Facebook Twitter

Report incidents

Telephone +66 (0)2-123-1227
E-mail [email protected]