{ "type": "bundle", "id": "bundle--8a83a8cd-b5fb-4123-9ffd-b99a5e5783c9", "spec_version": "2.0", "objects": [ { "labels": [ "tool" ], "x_mitre_platforms": [ "Windows" ], "x_mitre_domains": [ "enterprise-attack" ], "x_mitre_aliases": [ "MCMD" ], "object_marking_refs": [ "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" ], "type": "tool", "id": "tool--975737f1-b10d-476f-8bda-3ec26ea57172", "created": "2020-08-13T17:15:25.702Z", "x_mitre_version": "1.1", "external_references": [ { "source_name": "mitre-attack", "external_id": "S0500", "url": "https://attack.mitre.org/software/S0500" }, { "source_name": "Secureworks MCMD July 2019", "url": "https://www.secureworks.com/research/mcmd-malware-analysis", "description": "Secureworks. (2019, July 24). MCMD Malware Analysis. Retrieved August 13, 2020." } ], "x_mitre_deprecated": false, "revoked": false, "description": "[MCMD](https://attack.mitre.org/software/S0500) is a remote access tool that provides remote command shell capability used by [Dragonfly 2.0](https://attack.mitre.org/groups/G0074).(Citation: Secureworks MCMD July 2019)", "modified": "2022-07-29T19:48:28.725Z", "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", "name": "MCMD", "x_mitre_attack_spec_version": "2.1.0", "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" } ] }