{ "type": "bundle", "id": "bundle--117e0d35-7701-4d4b-8730-681d64203a4a", "spec_version": "2.0", "objects": [ { "labels": [ "malware" ], "x_mitre_platforms": [ "Windows" ], "x_mitre_domains": [ "enterprise-attack" ], "x_mitre_aliases": [ "Spark" ], "object_marking_refs": [ "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" ], "id": "malware--03ea629c-517a-41e3-94f8-c7e5368cf8f4", "type": "malware", "created": "2020-12-15T01:30:05.198Z", "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", "external_references": [ { "external_id": "S0543", "source_name": "mitre-attack", "url": "https://attack.mitre.org/software/S0543" }, { "source_name": "Spark", "description": "\n(Citation: Unit42 Molerat Mar 2020) " }, { "source_name": "Unit42 Molerat Mar 2020", "url": "https://unit42.paloaltonetworks.com/molerats-delivers-spark-backdoor/", "description": "Falcone, R., et al. (2020, March 3). Molerats Delivers Spark Backdoor to Government and Telecommunications Organizations. Retrieved December 14, 2020." } ], "modified": "2021-08-18T23:49:01.615Z", "name": "Spark", "description": "\n[Spark](https://attack.mitre.org/software/S0543) is a Windows backdoor and has been in use since as early as 2017.(Citation: Unit42 Molerat Mar 2020) ", "x_mitre_version": "1.1", "x_mitre_attack_spec_version": "2.1.0", "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" } ] }