Pikabot

MITRE
Tipo Malware:
Other
Prima attivita:
Unknown
Ultima attivita:
Unknown
Dettagli:

[Pikabot](https://attack.mitre.org/software/S1145) is a backdoor used for initial access and follow-on tool deployment active since early 2023. [Pikabot](https://attack.mitre.org/software/S1145) is notable for extensive use of multiple encoding, encryption, and defense evasion mechanisms to evade defenses and avoid analysis. [Pikabot](https://attack.mitre.org/software/S1145) has some overlaps with [QakBot](https://attack.mitre.org/software/S0650), but insufficient evidence exists to definitively link these two malware families. [Pikabot](https://attack.mitre.org/software/S1145) is frequently used to deploy follow on tools such as [Cobalt Strike](https://attack.mitre.org/software/S0154) or ransomware variants.(Citation: Zscaler Pikabot 2023)(Citation: Elastic Pikabot 2024)(Citation: Logpoint Pikabot 2024)

Tecniche Associate (21)
ID ATT&CK Tattiche
T1016 System Network Configuration Discovery -
T1027.003 Steganography -
T1027.009 Embedded Payloads -
T1027.011 Fileless Storage -
T1041 Exfiltration Over C2 Channel -
T1055.002 Portable Executable Injection -
T1055.003 Thread Execution Hijacking -
T1059.003 Windows Command Shell -
T1082 System Information Discovery -
T1087.001 Local Account -
T1106 Native API -
T1132.001 Standard Encoding -
T1140 Deobfuscate/Decode Files or Information -
T1480.001 Environmental Keying -
T1482 Domain Trust Discovery -
Usato da Attori (1)
Metadata
ID: 8
Created: 13/01/2026 17:48
Updated: 06/03/2026 04:00