PipeMon
MITRE
Malware Type:
Other
Other
First seen:
Unknown
Unknown
Last seen:
Unknown
Unknown
Details:
[PipeMon](https://attack.mitre.org/software/S0501) is a multi-stage modular backdoor used by [Winnti Group](https://attack.mitre.org/groups/G0044).(Citation: ESET PipeMon May 2020)
Associated Techniques (23)
| ID | ATT&CK | Tactics |
|---|---|---|
| T1008 | Fallback Channels | - |
| T1016 | System Network Configuration Discovery | - |
| T1027.011 | Fileless Storage | - |
| T1027.013 | Encrypted/Encoded File | - |
| T1036.005 | Match Legitimate Resource Name or Location | - |
| T1055.001 | Dynamic-link Library Injection | - |
| T1057 | Process Discovery | - |
| T1082 | System Information Discovery | - |
| T1095 | Non-Application Layer Protocol | - |
| T1105 | Ingress Tool Transfer | - |
| T1106 | Native API | - |
| T1112 | Modify Registry | - |
| T1124 | System Time Discovery | - |
| T1129 | Shared Modules | - |
| T1134.002 | Create Process with Token | - |
Used by Actors (1)
Metadata
| ID: | 372 |
| Created: | 13/01/2026 17:48 |
| Updated: | 06/03/2026 16:00 |