Pikabot
MITREOther
Unknown
Unknown
[Pikabot](https://attack.mitre.org/software/S1145) is a backdoor used for initial access and follow-on tool deployment active since early 2023. [Pikabot](https://attack.mitre.org/software/S1145) is notable for extensive use of multiple encoding, encryption, and defense evasion mechanisms to evade defenses and avoid analysis. [Pikabot](https://attack.mitre.org/software/S1145) has some overlaps with [QakBot](https://attack.mitre.org/software/S0650), but insufficient evidence exists to definitively link these two malware families. [Pikabot](https://attack.mitre.org/software/S1145) is frequently used to deploy follow on tools such as [Cobalt Strike](https://attack.mitre.org/software/S0154) or ransomware variants.(Citation: Zscaler Pikabot 2023)(Citation: Elastic Pikabot 2024)(Citation: Logpoint Pikabot 2024)
Tecniche Associate (21)
| ID | ATT&CK | Tattiche |
|---|---|---|
| T1016 | System Network Configuration Discovery | - |
| T1027.003 | Steganography | - |
| T1027.009 | Embedded Payloads | - |
| T1027.011 | Fileless Storage | - |
| T1041 | Exfiltration Over C2 Channel | - |
| T1055.002 | Portable Executable Injection | - |
| T1055.003 | Thread Execution Hijacking | - |
| T1059.003 | Windows Command Shell | - |
| T1082 | System Information Discovery | - |
| T1087.001 | Local Account | - |
| T1106 | Native API | - |
| T1132.001 | Standard Encoding | - |
| T1140 | Deobfuscate/Decode Files or Information | - |
| T1480.001 | Environmental Keying | - |
| T1482 | Domain Trust Discovery | - |
Usato da Attori (1)
Metadata
| ID: | 8 |
| Created: | 13/01/2026 17:48 |
| Updated: | 06/03/2026 04:00 |