MuddyViper
MITRE
Malware Type:
Other
Other
First seen:
Unknown
Unknown
Last seen:
Unknown
Unknown
Details:
[MuddyViper](https://attack.mitre.org/software/S9032) is custom backdoor written in C and C++ used by [MuddyWater](https://attack.mitre.org/groups/G0069) for command and control (C2) communications and persistence. [MuddyViper](https://attack.mitre.org/software/S9032) is loaded by [Fooder](https://attack.mitre.org/software/S9033) and sends frequent messages to the C2 server.(Citation: ESET_MuddyWater_Dec2025)
Associated Techniques (18)
| ID | ATT&CK | Tactics |
|---|---|---|
| T1041 | Exfiltration Over C2 Channel | - |
| T1053.005 | Scheduled Task | - |
| T1056.002 | GUI Input Capture | - |
| T1057 | Process Discovery | - |
| T1059 | Command and Scripting Interpreter | - |
| T1059.001 | PowerShell | - |
| T1059.003 | Windows Command Shell | - |
| T1071.001 | Web Protocols | - |
| T1105 | Ingress Tool Transfer | - |
| T1106 | Native API | - |
| T1112 | Modify Registry | - |
| T1140 | Deobfuscate/Decode Files or Information | - |
| T1518.001 | Security Software Discovery | - |
| T1547.001 | Registry Run Keys / Startup Folder | - |
| T1560 | Archive Collected Data | - |
Used by Actors (1)
Metadata
| ID: | 164429 |
| Created: | 28/04/2026 16:00 |
| Updated: | 10/05/2026 16:00 |