Alias Description | Votes |
---|---|
Meterpreter Stager is a possible alias for Meterpreter. The Meterpreter stager is a type of malware, which is malicious software designed to infiltrate and exploit computer systems. It can enter your system through suspicious downloads, emails, or websites, often unbeknownst to the user. Once inside, it has the potential to steal personal information, di | 3 |
wkhpd.exe is a possible alias for Meterpreter. wkhpd.exe is a malicious software (malware) that was created and used by Advanced Persistent Threat (APT) actors. This malware is a variant of Metasploit's Meterpreter, which was specifically designed to exploit the ServiceDesk system. The creation and use of this malware were first identified on Fe | 2 |
Tinymet is a possible alias for Meterpreter. TinyMet is a type of malware, specifically a tiny, flexible Meterpreter stager, that can infiltrate systems and cause significant damage. It has been used by threat actors like GOLD TAHOE to retrieve the TinyMet Meterpreter stager in Clop ransomware incidents. This harmful program can infect your sy | 2 |
Alias Description | Association Type | Votes |
---|---|---|
The Bumblebee Malware is associated with Meterpreter. Bumblebee is a type of malware that has been linked to ITG23, a cybercriminal group known for its use of crypters such as Emotet, IcedID, Qakbot, Bumblebee, and Gozi. Distributed via phishing campaigns or compromised websites, Bumblebee enables the delivery and execution of further payloads. The sam | Unspecified | 2 |
The PlugX Malware is associated with Meterpreter. PlugX is a Remote Access Trojan (RAT) malware known for its stealthy operations and destructive capabilities. It is often used by threat actors to exploit and damage computer systems, steal personal information, disrupt operations, or hold data hostage for ransom. Its deployment has been linked to s | Unspecified | 2 |
The Cobalt Strike Beacon Malware is associated with Meterpreter. Cobalt Strike Beacon is a type of malware that has been linked to various ransomware activities. This malicious software has been loaded by HUI Loader in several instances, with different files such as mpc.tmp, dlp.ini, and vmtools.ini being used. A unique feature of this Cobalt Strike Beacon shellc | Unspecified | 2 |
Preview | Source Link | CreatedAt | Title |
---|---|---|---|
Securityaffairs | a month ago | ||
Recorded Future | 3 months ago | ||
DARKReading | 6 months ago | ||
CERT-EU | 7 months ago | ||
CERT-EU | 7 months ago | ||
CERT-EU | 7 months ago | ||
DARKReading | 9 months ago | ||
CERT-EU | 9 months ago | ||
DARKReading | 9 months ago | ||
Recorded Future | 9 months ago | ||
MITRE | 2 years ago | ||
CERT-EU | 9 months ago | ||
Unit42 | 10 months ago | ||
CERT-EU | 10 months ago | ||
Flashpoint | 2 years ago | ||
CERT-EU | a year ago | ||
CERT-EU | a year ago | ||
CERT-EU | a year ago | ||
CERT-EU | a year ago | ||
CERT-EU | a year ago |