← All malware

Milleniumrat

Last 7 days

Mar 1, 2026
SHAs
1
C2 Total
1
C2 Unique
1
C2 New
1

Behavioral Tags

stealer100%trojan100%defense_evasion100%botnet:default100%credential_access100%discovery100%execution100%persistence100%pyinstaller100%rat100%spyware100%

MITRE ATT&CK Techniques

T1005Data from Local System
100%

Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.

T1012Query Registry
100%

Adversaries may interact with the Windows Registry to gather information about the system, configuration, and installed software.

T1059.001PowerShell
100%

Adversaries may abuse PowerShell commands and scripts for execution.

T1082System Information Discovery
100%

An adversary may attempt to get detailed information about the operating system and hardware, including version, patches, hotfixes, service packs, and architecture.

T1102Web Service
100%

Adversaries may use an existing, legitimate external Web service as a means for relaying data to/from a compromised system.

T1112Modify Registry
100%

Adversaries may interact with the Windows Registry as part of a variety of other techniques to aid in defense evasion, persistence, and execution.

T1124System Time Discovery
100%

An adversary may gather the system time and/or time zone settings from a local or remote system.

T1217Browser Information Discovery
100%

Adversaries may enumerate information about browsers to learn more about compromised environments.

T1489Service Stop
100%

Adversaries may stop or disable services on a system to render those services unavailable to legitimate users.

T1539Steal Web Session Cookie
100%

An adversary may steal web application or service session cookies and use them to gain access to web applications or Internet services as an authenticated user without needing credentials.

T1543.003Windows Service
100%

Adversaries may create or modify Windows services to repeatedly execute malicious payloads as part of persistence.

T1547.001Registry Run Keys / Startup Folder
100%

Adversaries may achieve persistence by adding a program to a startup folder or referencing it with a Registry run key.

T1552.001Credentials In Files
100%

Adversaries may search local file systems and remote file shares for files containing insecurely stored credentials.

T1555.003Credentials from Web Browsers
100%

Adversaries may acquire credentials from web browsers by reading files specific to the target browser.

T1556Modify Authentication Process
100%

Adversaries may modify authentication mechanisms and processes to access user credentials or enable otherwise unwarranted access to accounts.

T1562Impair Defenses
100%

Adversaries may maliciously modify components of a victim environment in order to hinder or disable defensive mechanisms.

T1562.001Disable or Modify Tools
100%

Adversaries may modify and/or disable security tools to avoid possible detection of their malware/tools and activities.

T1564.001Hidden Files and Directories
100%

Adversaries may set files and directories to be hidden to evade detection mechanisms.

T1569.002Service Execution
100%

Adversaries may abuse the Windows service control manager to execute malicious commands or payloads.

T1614.001System Language Discovery
100%

Adversaries may attempt to gather information about the system language of a victim in order to infer the geographical location of that host.

Port Distribution

22158100% · 1 hosts