# JPIN > Tipo: **malware** · S0201 · [MITRE ATT&CK](https://attack.mitre.org/software/S0201) ## Descrição [[jpin|JPIN]] é uma família de backdoor personalizado utilizada pelo [[g0068-platinum|PLATINUM]]. Evidências sugerem que os desenvolvedores das bases de código do [[jpin|JPIN]] e do [[s0200-dipsind|Dipsind]] estavam relacionados de alguma forma. **Plataformas:** Windows ## Técnicas Utilizadas - [[t1222-001-windows-file-and-directory-permissions-modification|T1222.001 - Windows File and Directory Permissions Modification]] - [[t1059-003-windows-command-shell|T1059.003 - Windows Command Shell]] - [[t1069-001-local-groups|T1069.001 - Local Groups]] - [[t1016-system-network-configuration-discovery|T1016 - System Network Configuration Discovery]] - [[t1057-process-discovery|T1057 - Process Discovery]] - [[t1070-004-file-deletion|T1070.004 - File Deletion]] - [[t1012-query-registry|T1012 - Query Registry]] - [[t1197-bits-jobs|T1197 - BITS Jobs]] - [[t1071-003-mail-protocols|T1071.003 - Mail Protocols]] - [[t1562-001-disable-or-modify-tools|T1562.001 - Disable or Modify Tools]] - [[t1083-file-and-directory-discovery|T1083 - File and Directory Discovery]] - [[t1055-process-injection|T1055 - Process Injection]] - [[t1105-ingress-tool-transfer|T1105 - Ingress Tool Transfer]] - [[t1056-001-keylogging|T1056.001 - Keylogging]] - [[t1033-system-owneruser-discovery|T1033 - System Owner/User Discovery]] ## Grupos que Usam - [[g0068-platinum|PLATINUM]] ## Referências - [MITRE ATT&CK - S0201](https://attack.mitre.org/software/S0201)