# JPIN
> Tipo: **malware** · S0201 · [MITRE ATT&CK](https://attack.mitre.org/software/S0201)
## Descrição
[[jpin|JPIN]] é uma família de backdoor personalizado utilizada pelo [[g0068-platinum|PLATINUM]]. Evidências sugerem que os desenvolvedores das bases de código do [[jpin|JPIN]] e do [[s0200-dipsind|Dipsind]] estavam relacionados de alguma forma.
**Plataformas:** Windows
## Técnicas Utilizadas
- [[t1222-001-windows-file-and-directory-permissions-modification|T1222.001 - Windows File and Directory Permissions Modification]]
- [[t1059-003-windows-command-shell|T1059.003 - Windows Command Shell]]
- [[t1069-001-local-groups|T1069.001 - Local Groups]]
- [[t1016-system-network-configuration-discovery|T1016 - System Network Configuration Discovery]]
- [[t1057-process-discovery|T1057 - Process Discovery]]
- [[t1070-004-file-deletion|T1070.004 - File Deletion]]
- [[t1012-query-registry|T1012 - Query Registry]]
- [[t1197-bits-jobs|T1197 - BITS Jobs]]
- [[t1071-003-mail-protocols|T1071.003 - Mail Protocols]]
- [[t1562-001-disable-or-modify-tools|T1562.001 - Disable or Modify Tools]]
- [[t1083-file-and-directory-discovery|T1083 - File and Directory Discovery]]
- [[t1055-process-injection|T1055 - Process Injection]]
- [[t1105-ingress-tool-transfer|T1105 - Ingress Tool Transfer]]
- [[t1056-001-keylogging|T1056.001 - Keylogging]]
- [[t1033-system-owneruser-discovery|T1033 - System Owner/User Discovery]]
## Grupos que Usam
- [[g0068-platinum|PLATINUM]]
## Referências
- [MITRE ATT&CK - S0201](https://attack.mitre.org/software/S0201)