ShimRat

MITRE
Tipo Malware:
Other
Prima attivita:
Unknown
Ultima attivita:
Unknown
Dettagli:

[ShimRat](https://attack.mitre.org/software/S0444) has been used by the suspected China-based adversary [Mofang](https://attack.mitre.org/groups/G0103) in campaigns targeting multiple countries and sectors including government, military, critical infrastructure, automobile, and weapons development. The name "[ShimRat](https://attack.mitre.org/software/S0444)" comes from the malware's extensive use of Windows Application Shimming to maintain persistence. (Citation: FOX-IT May 2016 Mofang)

Tecniche Associate (21)
ID ATT&CK Tattiche
T1005 Data from Local System -
T1008 Fallback Channels -
T1027.002 Software Packing -
T1027.015 Compression -
T1029 Scheduled Transfer -
T1036.004 Masquerade Task or Service -
T1059.003 Windows Command Shell -
T1070.004 File Deletion -
T1071.001 Web Protocols -
T1083 File and Directory Discovery -
T1090.002 External Proxy -
T1105 Ingress Tool Transfer -
T1106 Native API -
T1112 Modify Registry -
T1135 Network Share Discovery -
Usato da Attori (1)
Metadata
ID: 248
Created: 13/01/2026 17:48
Updated: 06/03/2026 16:00