{ "type": "bundle", "id": "bundle--3632d7b3-006d-4999-afc1-b486b3a5433e", "spec_version": "2.0", "objects": [ { "labels": [ "tool" ], "x_mitre_platforms": [ "Windows" ], "x_mitre_domains": [ "enterprise-attack" ], "x_mitre_contributors": [ "Jose Luis S\u00e1nchez Martinez" ], "x_mitre_aliases": [ "Imminent Monitor" ], "object_marking_refs": [ "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" ], "id": "tool--8f8cd191-902c-4e83-bf20-b57c8c4640e9", "type": "tool", "created": "2020-05-05T18:45:36.358Z", "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", "external_references": [ { "external_id": "S0434", "source_name": "mitre-attack", "url": "https://attack.mitre.org/software/S0434" }, { "source_name": "Imminent Unit42 Dec2019", "url": "https://unit42.paloaltonetworks.com/imminent-monitor-a-rat-down-under/", "description": "Unit 42. (2019, December 2). Imminent Monitor \u2013 a RAT Down Under. Retrieved May 5, 2020." } ], "modified": "2020-07-10T13:39:26.417Z", "name": "Imminent Monitor", "description": "[Imminent Monitor](https://attack.mitre.org/software/S0434) was a commodity remote access tool (RAT) offered for sale from 2012 until 2019, when an operation was conducted to take down the Imminent Monitor infrastructure. Various cracked versions and variations of this RAT are still in circulation.(Citation: Imminent Unit42 Dec2019)", "x_mitre_version": "1.0", "x_mitre_attack_spec_version": "2.1.0", "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" } ] }