{ "type": "bundle", "id": "bundle--d1ab8cd7-940a-43b1-8d28-ac71dad01bfb", "spec_version": "2.0", "objects": [ { "labels": [ "malware" ], "x_mitre_platforms": [ "Windows" ], "x_mitre_domains": [ "enterprise-attack" ], "x_mitre_aliases": [ "BUBBLEWRAP", "Backdoor.APT.FakeWinHTTPHelper" ], "object_marking_refs": [ "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" ], "id": "malware--123bd7b3-675c-4b1a-8482-c55782b20e2b", "type": "malware", "created": "2017-05-31T21:32:33.738Z", "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", "external_references": [ { "source_name": "mitre-attack", "url": "https://attack.mitre.org/software/S0043", "external_id": "S0043" }, { "source_name": "FireEye admin@338", "description": "FireEye Threat Intelligence. (2015, December 1). China-based Cyber Threat Group Uses Dropbox for Malware Communications and Targets Hong Kong Media Outlets. Retrieved December 4, 2015.", "url": "https://www.fireeye.com/blog/threat-research/2015/11/china-based-threat.html" } ], "modified": "2020-03-30T15:03:26.307Z", "name": "BUBBLEWRAP", "description": "[BUBBLEWRAP](https://attack.mitre.org/software/S0043) is a full-featured, second-stage backdoor used by the [admin@338](https://attack.mitre.org/groups/G0018) group. It is set to run when the system boots and includes functionality to check, upload, and register plug-ins that can further enhance its capabilities. (Citation: FireEye admin@338)", "x_mitre_version": "1.1", "x_mitre_attack_spec_version": "2.1.0", "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" } ] }