C0025 2016 Ukraine Electric Power Attack

During the 2016 Ukraine Electric Power Attack, Sandworm Team used Mimikatz to capture and use legitimate credentials.[6]

G1030 Agrius

Agrius used tools such as Mimikatz to dump LSASS memory to capture credentials in victim environments.[7]

G0006 APT1

APT1 has been known to use credential dumping using Mimikatz.[8]

G0007 APT28

APT28 regularly deploys both publicly available (ex: Mimikatz) and custom password retrieval tools on victims.[9][10] They have also dumped the LSASS process memory using the MiniDump function.[11]

G0022 APT3

APT3 has used a tool to dump credentials by injecting itself into lsass.exe and triggering with the argument "dig."[12]

G0050 APT32

APT32 used Mimikatz and customized versions of Windows Credential Dumper to harvest credentials.[13][14]

G0064 APT33

APT33 has used a variety of publicly available tools like LaZagne, Mimikatz, and ProcDump to dump credentials.[15][16]

G0087 APT39

APT39 has used Mimikatz, Windows Credential Editor and ProcDump to dump credentials.[17]

G0096 APT41

APT41 has used hashdump, Mimikatz, Procdump, and the Windows Credential Editor to dump password hashes from memory and authenticate to other user accounts.[18][19][20]

G1023 APT5

APT5 has used the Task Manager process to target LSASS process memory in order to obtain NTLM password hashes. APT5 has also dumped clear text passwords and hashes from memory using Mimikatz hosted through an RDP mapped drive.[21]

G0143 Aquatic Panda

Aquatic Panda has attempted to harvest credentials through LSASS memory dumping.[22]

S0606 Bad Rabbit

Bad Rabbit has used Mimikatz to harvest credentials from the victim's machine.[23]

G0108 Blue Mockingbird

Blue Mockingbird has used Mimikatz to retrieve credentials from LSASS memory.[24]

G0060 BRONZE BUTLER

BRONZE BUTLER has used various tools (such as Mimikatz and WCE) to perform credential dumping.[25]

C0032 C0032

During the C0032 campaign, TEMP.Veles used Mimikatz and a custom tool, SecHack, to harvest credentials.[26]

G0003 Cleaver

Cleaver has been known to dump credentials using Mimikatz and Windows Credential Editor.[27]

S0154 Cobalt Strike

Cobalt Strike can spawn a job to inject into LSASS memory and dump password hashes.[28]

S0046 CozyCar

CozyCar has executed Mimikatz to harvest stored credentials from the victim and further victim penetration.[29]

C0029 Cutting Edge

During Cutting Edge, threat actors used Task Manager to dump LSASS memory from Windows devices to disk.[30]

S0187 Daserf

Daserf leverages Mimikatz and Windows Credential Editor to steal credentials.[31]

G1006 Earth Lusca

Earth Lusca has used ProcDump to obtain the hashes of credentials by dumping the memory of the LSASS process.[32]

G1003 Ember Bear

Ember Bear uses legitimate Sysinternals tools such as procdump to dump LSASS memory.[33][34]

S0367 Emotet

Emotet has been observed dropping and executing password grabber modules including Mimikatz.[35][36]

S0363 Empire

Empire contains an implementation of Mimikatz to gather credentials from memory.[37]

G1016 FIN13

FIN13 has obtained memory dumps with ProcDump to parse and extract credentials from a victim's LSASS process memory with Mimikatz.[38][39]

G0037 FIN6

FIN6 has used Windows Credential Editor for credential dumping.[40][41]

G0061 FIN8

FIN8 harvests credentials using Invoke-Mimikatz or Windows Credentials Editor (WCE).[42]

G0117 Fox Kitten

Fox Kitten has used prodump to dump credentials from LSASS.[43]

G0093 GALLIUM

GALLIUM used a modified version of Mimikatz along with a PowerShell-based Mimikatz to dump credentials on the victim machines.[44][45]

S0342 GreyEnergy

GreyEnergy has a module for Mimikatz to collect Windows credentials from the victim’s machine.[46]

G0125 HAFNIUM

HAFNIUM has used procdump to dump the LSASS process memory.[47][1][48]

C0038 HomeLand Justice

During HomeLand Justice, threat actors dumped LSASS memory on compromised hosts.[49]

S0357 Impacket

SecretsDump and Mimikatz modules within Impacket can perform credential dumping to obtain account and password information.[50]

G0119 Indrik Spider

Indrik Spider used Cobalt Strike to carry out credential dumping using ProcDump.[51]

G0004 Ke3chang

Ke3chang has dumped credentials, including by using Mimikatz.[52][53][54]

G0094 Kimsuky

Kimsuky has gathered credentials using Mimikatz and ProcDump.[55][56][57]

S0349 LaZagne

LaZagne can perform credential dumping from memory to obtain account and password information.[58]

G0077 Leafminer

Leafminer used several tools for retrieving login and password information, including LaZagne and Mimikatz.[59]

G0065 Leviathan

Leviathan has used publicly available tools to dump password hashes, including ProcDump and WCE.[60]

S0681 Lizar

Lizar can run Mimikatz to harvest credentials.[61][62]

S0121 Lslsass

Lslsass can dump active logon session password hashes from the lsass process.[8]

S1060 Mafalda

Mafalda can dump password hashes from LSASS.exe.[63]

G0059 Magic Hound

Magic Hound has stolen domain credentials by dumping LSASS process memory using Task Manager, comsvcs.dll, and from a Microsoft Active Directory Domain Controller using Mimikatz.[64][65][66][67]

S0002 Mimikatz

Mimikatz performs credential dumping to obtain account and password information useful in gaining access to additional systems and enterprise network resources. It contains functionality to acquire information about credentials in many ways, including from the LSASS Memory.[68][69][70][71]

G1036 Moonstone Sleet

Moonstone Sleet retrieved credentials from LSASS memory.[72]

G0069 MuddyWater

MuddyWater has performed credential dumping with Mimikatz and procdump64.exe.[73][74][75]

S0056 Net Crawler

Net Crawler uses credential dumpers such as Mimikatz and Windows Credential Editor to extract cached credentials from Windows systems.[27]

S0368 NotPetya

NotPetya contains a modified version of Mimikatz to help gather credentials that are later used for lateral movement.[76][77][71]

G0049 OilRig

OilRig has used credential dumping tools such as Mimikatz to steal credentials to accounts logged into the compromised system and to Outlook Web Access.[78][79][64][80]

S0439 Okrum

Okrum was seen using MimikatzLite to perform credential dumping.[81]

S0365 Olympic Destroyer

Olympic Destroyer contains a module that tries to obtain credentials from LSASS, similar to Mimikatz. These credentials are used with PsExec and Windows Management Instrumentation to help the malware propagate itself across a network.[82]

C0014 Operation Wocao

During Operation Wocao, threat actors used ProcDump to dump credentials from memory.[83]

G0068 PLATINUM

PLATINUM has used keyloggers that are also capable of dumping credentials.[84]

G1040 Play

Play has used Mimikatz and the Windows Task Manager to dump LSASS process memory.[85]

S0428 PoetRAT

PoetRAT used voStro.exe, a compiled pypykatz (Python version of Mimikatz), to steal credentials.[86]

S0378 PoshC2

PoshC2 contains an implementation of Mimikatz to gather credentials from memory.[87]

S0194 PowerSploit

PowerSploit contains a collection of Exfiltration modules that can harvest credentials using Mimikatz.[88][89]

S0192 Pupy

Pupy can execute Lazagne as well as Mimikatz using PowerShell.[90]

S0583 Pysa

Pysa can perform OS credential dumping using Mimikatz.[91]

G1039 RedCurl

RedCurl used LaZagne to obtain passwords from memory.[92][93]

G0034 Sandworm Team

Sandworm Team has used its plainpwd tool, a modified version of Mimikatz, and comsvcs.dll to dump Windows credentials from system memory.[94][95][96]

G0091 Silence

Silence has used the Farse6.1 utility (based on Mimikatz) to extract credentials from lsass.exe.[97]

S0692 SILENTTRINITY

SILENTTRINITY can create a memory dump of LSASS via the MiniDumpWriteDump Win32 API call.[98]

G0027 Threat Group-3390

Threat Group-3390 actors have used a modified version of Mimikatz called Wrapikatz to dump credentials. They have also dumped credentials from domain controllers.[99][100]

C0030 Triton Safety Instrumented System Attack

In the Triton Safety Instrumented System Attack, TEMP.Veles used Mimikatz.[101]

G1017 Volt Typhoon

Volt Typhoon has attempted to access hashed credentials from the LSASS process memory space.[102][103]

G0107 Whitefly

Whitefly has used Mimikatz to obtain credentials.[104]

S0005 Windows Credential Editor

Windows Credential Editor can dump credentials.[105]

G0102 Wizard Spider

Wizard Spider has dumped the lsass.exe memory to harvest credentials with the use of open-source tool LaZagne.[106]