| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1555 | 从密码存储中获取凭证 |
Mimikatz performs credential dumping to obtain account and password information useful in gaining access to additional systems and enterprise network resources. It contains functionality to acquire information about credentials in many ways, including from the credential vault and DPAPI.[1][3][4][5][6] |
|
| .003 | Credentials from Web Browsers |
Mimikatz performs credential dumping to obtain account and password information useful in gaining access to additional systems and enterprise network resources. It contains functionality to acquire information about credentials in many ways, including from DPAPI.[1][3][4][5] |
||
| .004 | Windows Credential Manager |
Mimikatz contains functionality to acquire credentials from the Windows Credential Manager.[7] |
||
| Enterprise | T1207 | 伪造域控制器 |
Mimikatz’s |
|
| Enterprise | T1550 | .002 | 使用备用认证材料: Pass the Hash |
Mimikatz's |
| .003 | 使用备用认证材料: Pass the Ticket |
Mimikatz’s |
||
| Enterprise | T1547 | .005 | 启动或登录自动启动执行: Security Support Provider |
The Mimikatz credential dumper contains an implementation of an SSP.[1] |
| Enterprise | T1003 | .001 | 操作系统凭证转储: LSASS Memory |
Mimikatz performs credential dumping to obtain account and password information useful in gaining access to additional systems and enterprise network resources. It contains functionality to acquire information about credentials in many ways, including from the LSASS Memory.[1][3][4][5] |
| .002 | 操作系统凭证转储: Security Account Manager |
Mimikatz performs credential dumping to obtain account and password information useful in gaining access to additional systems and enterprise network resources. It contains functionality to acquire information about credentials in many ways, including from the SAM table.[1][3][4][5] |
||
| .004 | 操作系统凭证转储: LSA Secrets |
Mimikatz performs credential dumping to obtain account and password information useful in gaining access to additional systems and enterprise network resources. It contains functionality to acquire information about credentials in many ways, including from the LSA.[1][3][4][5] |
||
| .006 | 操作系统凭证转储: DCSync |
Mimikatz performs credential dumping to obtain account and password information useful in gaining access to additional systems and enterprise network resources. It contains functionality to acquire information about credentials in many ways, including from DCSync/NetSync.[1][3][4][5][6] |
||
| Enterprise | T1552 | .004 | 未加密凭证: Private Keys |
Mimikatz's |
| Enterprise | T1558 | .001 | 窃取或伪造Kerberos票据: Golden Ticket |
Mimikatz's kerberos module can create golden tickets.[10][6] |
| .002 | 窃取或伪造Kerberos票据: Silver Ticket | |||
| Enterprise | T1649 | 窃取或伪造身份认证证书 |
Mimikatz's |
|
| Enterprise | T1134 | .005 | 访问令牌操控: SID-History Injection |
Mimikatz's |
| Enterprise | T1098 | 账号操控 |
The Mimikatz credential dumper has been extended to include Skeleton Key domain controller authentication bypass functionality. The |
|
| ID | Name | References |
|---|---|---|
| G0050 | APT32 | |
| G0016 | APT29 | |
| G1006 | Earth Lusca | |
| G0046 | FIN7 | |
| G0079 | DarkHydrus | |
| G0092 | TA505 | |
| G1030 | Agrius |
Agrius used Mimikatz to dump credentials from LSASS memory.[26] |
| G0060 | BRONZE BUTLER | |
| G0034 | Sandworm Team | |
| G0064 | APT33 | |
| G1024 | Akira | |
| G0131 | Tonto Team | |
| G0087 | APT39 | |
| G0108 | Blue Mockingbird | |
| G0080 | Cobalt Group | |
| G0027 | Threat Group-3390 |
Threat Group-3390 has used a modified version of Mimikatz called Wrapikatz.[42][43][44][45][46] |
| G0004 | Ke3chang | |
| G0045 | menuPass | |
| G1023 | APT5 | |
| G0088 | TEMP.Veles | |
| G0007 | APT28 | |
| G0006 | APT1 | |
| G1016 | FIN13 | |
| G0059 | Magic Hound | |
| G1015 | Scattered Spider |
Scattered Spider has gathered credentials using Mimikatz.[58][59] |
| G0076 | Thrip | |
| G1004 | LAPSUS$ | |
| G1017 | Volt Typhoon | |
| G0135 | BackdoorDiplomacy | |
| G0119 | Indrik Spider | |
| G0093 | GALLIUM | |
| G0069 | MuddyWater | |
| G0077 | Leafminer | |
| G0096 | APT41 | |
| G0003 | Cleaver | |
| G0082 | APT38 | |
| G0010 | Turla | |
| G0114 | Chimera | |
| G0102 | Wizard Spider | |
| G0008 | Carbanak | |
| G0011 | PittyTiger | |
| G1001 | HEXANE | |
| G0035 | Dragonfly | |
| G0049 | OilRig | |
| G0094 | Kimsuky | |
| G1040 | Play | |
| G0037 | FIN6 | |
| G0107 | Whitefly |
| ID | Name | Description |
|---|---|---|
| C0017 | C0017 |
During C0017, APT41 used Mimikatz to execute the |
| C0018 | C0018 | |
| C0032 | C0032 | |
| C0038 | HomeLand Justice | |
| C0014 | Operation Wocao |
During Operation Wocao, threat actors used Mimikatz with the |
| C0024 | SolarWinds Compromise | |
| C0030 | Triton Safety Instrumented System Attack |