Threat Group Cards: A Threat Actor Encyclopedia Archived: 2026-04-05 21:36:57 UTC Home > List all groups > List all tools > List all groups using tool WARPRISM Tool: WARPRISM Names WARPRISM Category Malware Type Dropper Description (FireEye) WARPRISM is a PowerShell dropper that has been observed by Mandiant delivering SunCrypt, Cobalt Strike, and Mimikatz. WARPRISM is used to evade endpoint detection and will load its payload directly into memory. WARPRISM may be used by multiple groups. Information Last change to this tool card: 15 May 2021 Download this tool card in JSON format All groups using tool WARPRISM Changed Name Country Observed APT groups   Carbanak, Anunak 2013-Apr 2023   SunCrypt Gang [Unknown] 2019-Oct 2020     UNC2447 [Unknown] 2020   3 groups listed (3 APT, 0 other, 0 unknown) Source: https://apt.etda.or.th/cgi-bin/listgroups.cgi?u=9672ed6f-d3ba-4a31-a3a0-aa19d6aeead8 https://apt.etda.or.th/cgi-bin/listgroups.cgi?u=9672ed6f-d3ba-4a31-a3a0-aa19d6aeead8 Page 1 of 1