Malpedia
Malware galaxy cluster based on Malpedia.
Authors
Authors and/or Contributors |
---|
Davide Arcuri |
Alexandre Dulaunoy |
Steffen Enders |
Andrea Garavaglia |
Andras Iklody |
Daniel Plohmann |
Christophe Vandeplas |
FastCash
Internal MISP references
UUID e8a04177-6a91-46a6-9f63-6a9fac4dfa02
which can be used as unique global reference for FastCash
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/aix.fastcash - webarchive
- https://github.com/fboldewin/FastCashMalwareDissected/ - webarchive
- https://www.symantec.com/blogs/threat-intelligence/fastcash-lazarus-atm-malware - webarchive
- https://mal-eats.net/en/2021/05/11/campo_new_attack_campaign_targeting_japan/ - webarchive
- https://blog.talosintelligence.com/2019/05/10-years-of-virtual-dynamite.html - webarchive
- https://www.cisa.gov/uscert/ncas/alerts/TA18-275A - webarchive
- https://www.cisa.gov/uscert/ncas/alerts/aa20-239a - webarchive
- https://www.youtube.com/watch?v=zGvQPtejX9w - webarchive
- https://symantec-blogs.broadcom.com/blogs/threat-intelligence/fastcash-lazarus-atm-malware - webarchive
- https://www.cisa.gov/uscert/sites/default/files/publications/AA22-108A-TraderTraitor-North_Korea_APT_Targets_Blockchain_Companies.pdf - webarchive
- https://i.blackhat.com/USA-20/Wednesday/us-20-Perlow-FASTCash-And-INJX_Pure-How-Threat-Actors-Use-Public-Standards-For-Financial-Fraud.pdf - webarchive
- https://i.blackhat.com/USA-20/Wednesday/us-20-Perlow-FASTCash-And-INJX_Pure-How-Threat-Actors-Use-Public-Standards-For-Financial-Fraud-wp.pdf - webarchive
- https://www.us-cert.gov/ncas/alerts/TA18-275A - webarchive
- https://i.blackhat.com/eu-20/Wednesday/eu-20-Rivera-From-Zero-To-Sixty-The-Story-Of-North-Koreas-Rapid-Ascent-To-Becoming-A-Global-Cyber-Superpower.pdf - webarchive
- https://www.youtube.com/watch?v=LUxOcpIRxmg - webarchive
- https://blog.lexfo.fr/ressources/Lexfo-WhitePaper-The_Lazarus_Constellation.pdf - webarchive
- https://threatrecon.nshc.net/2019/01/23/sectora01-custom-proxy-utility-tool-analysis/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
888 RAT
Internal MISP references
UUID e98ae895-0831-4e10-aad1-593d1c678db1
which can be used as unique global reference for 888 RAT
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Aberebot
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Aberebot.
Known Synonyms |
---|
Escobar |
Internal MISP references
UUID 4b9c0228-2bfd-4bc7-bd64-8357a2da12ee
which can be used as unique global reference for Aberebot
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/apk.aberebot - webarchive
- https://blog.cyble.com/2021/07/30/aberebot-on-the-rise-new-banking-trojan-targeting-users-through-phishing/ - webarchive
- https://blog.cyble.com/2022/03/10/aberebot-returns-as-escobar/ - webarchive
- https://www.bleepingcomputer.com/news/security/android-malware-escobar-steals-your-google-authenticator-mfa-codes/ - webarchive
- https://hothardware.com/news/escobar-banking-trojan-targets-mfa-codes - webarchive
- https://blogs.blackberry.com/en/2022/05/dot-net-stubs-sowing-the-seeds-of-discord - webarchive
- https://twitter.com/icebre4ker/status/1460527428544176128 - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
AbstractEmu
According to PCrisk, AbstractEmu is the name of rooting malware that can gain privileged access to the Android operating system. Threat actors behind AbstractEmu are using legitimate-looking apps (like password managers, app launchers, data savers) to trick users into downloading and opening/executing this malware.
Internal MISP references
UUID 57a4c8c0-140a-45e3-9166-64e3e35c5986
which can be used as unique global reference for AbstractEmu
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/apk.abstract_emu - webarchive
- https://blogs.blackberry.com/en/2022/05/dot-net-stubs-sowing-the-seeds-of-discord - webarchive
- https://blog.lookout.com/lookout-discovers-global-rooting-malware-campaign - webarchive
- https://www.sentinelone.com/labs/the-art-and-science-of-macos-malware-hunting-with-radare2-leveraging-xrefs-yara-and-zignatures/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
ActionSpy
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular ActionSpy.
Known Synonyms |
---|
AxeSpy |
Internal MISP references
UUID 5c7a35bf-e5f1-4b07-b93a-c3608cc9142e
which can be used as unique global reference for ActionSpy
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/apk.actionspy - webarchive
- https://blog.trendmicro.com/trendlabs-security-intelligence/new-android-spyware-actionspy-revealed-via-phishing-attacks-from-earth-empusa/ - webarchive
- https://www.trendmicro.com/en_us/research/20/f/new-android-spyware-actionspy-revealed-via-phishing-attacks-from-earth-empusa.html - webarchive
- https://about.fb.com/news/2021/03/taking-action-against-hackers-in-china/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
AdoBot
Internal MISP references
UUID d95708e9-220a-428c-b126-a63986099892
which can be used as unique global reference for AdoBot
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
AdultSwine
Internal MISP references
UUID 824f284b-b38b-4a57-9e4a-aee4061a5b2d
which can be used as unique global reference for AdultSwine
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Agent Smith
Internal MISP references
UUID 34770e6e-e2c3-4e45-aa86-9d74b5309773
which can be used as unique global reference for Agent Smith
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
AhMyth
According to PCrisk, Ahmyth is a Remote Access Trojan (RAT) targeting Android users. It is distributed via trojanized (fake) applications. Ahmyth RAT steals cryptocurrency and banking credentials, 2FA codes, lock screen passcodes, and captures screenshots.
Internal MISP references
UUID 86a5bb47-ac59-449a-8ff2-ae46e19cc6d2
which can be used as unique global reference for AhMyth
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/apk.ahmyth - webarchive
- https://www.secrss.com/articles/24995 - webarchive
- https://www.welivesecurity.com/2019/08/22/first-spyware-android-ahmyth-google-play/ - webarchive
- https://www.stratosphereips.org/blog/2020/11/10/android-mischief-rats-dataset - webarchive
- https://deform.co/hacker-group-caracal-kitten-targets-kdp-activists-with-malware/ - webarchive
- https://securelist.com/transparent-tribe-part-2/98233/ - webarchive
- https://mp.weixin.qq.com/s/J_A12SOX0k5TOYFAegBv_w - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Alien
According to ThreatFabric, this is a fork of Cerberus v1 (active January 2020+). Alien is a rented banking trojan that can remotely control a phone and achieves RAT functionality by abusing TeamViewer.
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Alien.
Known Synonyms |
---|
AlienBot |
Internal MISP references
UUID de483b10-4247-46b3-8ab5-77d089f0145c
which can be used as unique global reference for Alien
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/apk.alien - webarchive
- https://www.checkpoint.com/press/2022/march-2022s-most-wanted-malware-easter-phishing-scams-help-emotet-assert-its-dominance/ - webarchive
- https://www.threatfabric.com/blogs/deceive-the-heavens-to-cross-the-sea.html - webarchive
- https://drive.google.com/file/d/1qd7Nqjhe2vyGZ5bGm6gVw0mM1D6YDolu/view?usp=sharing - webarchive
- https://www.prodaft.com/m/reports/BrunHilda_DaaS.pdf - webarchive
- https://resecurity.com/blog/article/in-the-box-mobile-malware-webinjects-marketplace - webarchive
- https://research.checkpoint.com/2021/clast82-a-new-dropper-on-google-play-dropping-the-alienbot-banker-and-mrat/ - webarchive
- https://www.threatfabric.com/blogs/alien_the_story_of_cerberus_demise.html - webarchive
- https://twitter.com/CPResearch/status/1603375823448317953 - webarchive
- https://info.phishlabs.com/blog/alien-mobile-malware-evades-detection-increases-targets - webarchive
- https://preyproject.com/blog/en/cerberus-and-alien-the-malware-that-has-put-android-in-a-tight-spot/ - webarchive
- https://www.bleepingcomputer.com/news/security/google-predator-spyware-infected-android-devices-using-zero-days/ - webarchive
- https://muha2xmad.github.io/malware-analysis/alien/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
AmexTroll
Internal MISP references
UUID 6b153952-9415-4710-8175-354b59252dbc
which can be used as unique global reference for AmexTroll
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
AmpleBot
This malware was initially named BlackRock and later renamed to AmpleBot.
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular AmpleBot.
Known Synonyms |
---|
BlackRock |
Internal MISP references
UUID 2f3f82f6-ec21-489e-8257-0967c567798a
which can be used as unique global reference for AmpleBot
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/apk.amplebot - webarchive
- https://www.threatfabric.com/blogs/alien_the_story_of_cerberus_demise.html - webarchive
- https://www.threatfabric.com/blogs/ermac-another-cerberus-reborn.html - webarchive
- https://www.threatfabric.com/blogs/blackrock_the_trojan_that_wanted_to_get_them_all.html - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Anatsa
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Anatsa.
Known Synonyms |
---|
ReBot |
TeaBot |
Toddler |
Internal MISP references
UUID 147081b9-7e59-4613-ad55-bbc08141fee1
which can be used as unique global reference for Anatsa
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/apk.anatsa - webarchive
- https://twitter.com/icebre4ker/status/1416409813467156482 - webarchive
- https://labs.bitdefender.com/2021/06/threat-actors-use-mockups-of-popular-apps-to-spread-teabot-and-flubot-malware-on-android/ - webarchive
- https://gbhackers.com/teabot-banking-trojan/ - webarchive
- https://www.cleafy.com/cleafy-labs/teabot-is-now-spreading-across-the-globe - webarchive
- https://www.threatfabric.com/blogs/smishing-campaign-in-nl-spreading-cabassous-and-anatsa.html - webarchive
- https://www.threatfabric.com/blogs/anatsa-hits-uk-and-dach-with-new-campaign - webarchive
- https://www.threatfabric.com/blogs/anatsa-trojan-returns-targeting-europe-and-expanding-its-reach - webarchive
- https://www.bitdefender.com/blog/labs/new-flubot-and-teabot-global-malware-campaigns-discovered - webarchive
- https://thehackernews.com/2022/01/widespread-flubot-and-teabot-malware.html - webarchive
- https://labs.k7computing.com/?p=22407 - webarchive
- https://blog.nviso.eu/2021/05/11/android-overlay-attacks-on-belgian-financial-applications/ - webarchive
- https://www.buguroo.com/hubfs/website/pdf/reports/buguroo-malware-report-Toddler_EN.pdf - webarchive
- https://twitter.com/ThreatFabric/status/1394958795508523008 - webarchive
- https://www.telekom.com/en/blog/group/article/flubot-under-the-microscope-636368 - webarchive
- https://www.threatfabric.com/blogs/deceive-the-heavens-to-cross-the-sea.html - webarchive
- https://labs.k7computing.com/index.php/play-store-app-serves-teabot-via-github/ - webarchive
- https://www.prodaft.com/m/reports/Toddler___TLPWHITE_V2.pdf - webarchive
- https://www.cleafy.com/cleafy-labs/a-stealthy-threat-uncovered-teabot-on-google-play-store - webarchive
- https://www.cleafy.com/documents/teabot - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
AndroRAT
Androrat is a remote administration tool developed in Java Android for the client side and in Java/Swing for the Server. The name Androrat is a mix of Android and RAT (Remote Access Tool). It has been developed in a team of 4 for a university project. The goal of the application is to give the control of the android system remotely and retrieve informations from it.
Internal MISP references
UUID 80447111-8085-40a4-a052-420926091ac6
which can be used as unique global reference for AndroRAT
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/apk.androrat - webarchive
- https://mp.weixin.qq.com/s/AhxP5HmROtMsFBiUxj0cFg - webarchive
- https://www.stratosphereips.org/blog/2021/3/29/dissecting-a-rat-analysis-of-the-androrat - webarchive
- https://hotforsecurity.bitdefender.com/blog/possibly-italy-born-android-rat-reported-in-china-find-bitdefender-researchers-16264.html - webarchive
- https://blog.talosintelligence.com/2022/05/bitter-apt-adds-bangladesh-to-their.html - webarchive
- https://www.bitdefender.com/files/News/CaseStudies/study/352/Bitdefender-PR-Whitepaper-BitterAPT-creat4571-en-EN-GenericUse.pdf - webarchive
- https://www.stratosphereips.org/blog/2020/11/10/android-mischief-rats-dataset - webarchive
- https://blog.trendmicro.com/trendlabs-security-intelligence/the-urpage-connection-to-bahamut-confucius-and-patchwork/ - webarchive
- https://www.stratosphereips.org/blog/2021/5/6/dissecting-a-rat-analysis-of-the-command-line-androrat - webarchive
- https://www.kaspersky.com/blog/mobile-malware-part-4/24290/ - webarchive
- https://github.com/DesignativeDave/androrat - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
ANDROSNATCH
According to Google, a Chrome cookie stealer.
Internal MISP references
UUID 8cd795ed-3a4d-41a3-abb1-0c3dd3aa4eab
which can be used as unique global reference for ANDROSNATCH
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Anubis (Android)
BleepingComputer found that Anubis will display fake phishing login forms when users open up apps for targeted platforms to steal credentials. This overlay screen will be shown over the real app's login screen to make victims think it's a legitimate login form when in reality, inputted credentials are sent to the attackers.
In the new version spotted by Lookout, Anubis now targets 394 apps and has the following capabilities:
Recording screen activity and sound from the microphone Implementing a SOCKS5 proxy for covert communication and package delivery Capturing screenshots Sending mass SMS messages from the device to specified recipients Retrieving contacts stored on the device Sending, reading, deleting, and blocking notifications for SMS messages received by the device Scanning the device for files of interest to exfiltrate Locking the device screen and displaying a persistent ransom note Submitting USSD code requests to query bank balances Capturing GPS data and pedometer statistics Implementing a keylogger to steal credentials Monitoring active apps to mimic and perform overlay attacks Stopping malicious functionality and removing the malware from the device
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Anubis (Android).
Known Synonyms |
---|
BankBot |
android.bankbot |
android.bankspy |
Internal MISP references
UUID 85975621-5126-40cb-8083-55cbfa75121b
which can be used as unique global reference for Anubis (Android)
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/apk.anubis - webarchive
- https://intel-honey.medium.com/reversing-anubis-malware-93f28d154bbb - webarchive
- https://pentest.blog/n-ways-to-unpack-mobile-malware/ - webarchive
- https://muha2xmad.github.io/malware-analysis/anubis/ - webarchive
- https://www.fortinet.com/blog/threat-research/bankbot-the-prequel.html - webarchive
- https://assets.virustotal.com/reports/2021trends.pdf - webarchive
- https://www.fortinet.com/blog/threat-research/a-look-into-the-new-strain-of-bankbot.html - webarchive
- http://blog.koodous.com/2017/05/bankbot-on-google-play.html - webarchive
- https://labs.bitdefender.com/2020/03/android-apps-and-malware-capitalize-on-coronavirus - webarchive
- https://bushidotoken.blogspot.com/2020/05/turkey-targeted-by-cerberus-and-anubis.html - webarchive
- https://securityaffairs.co/wordpress/133115/hacking/anubis-networks-new-c2.html - webarchive
- http://b0n1.blogspot.de/2017/05/tracking-android-bankbot.html - webarchive
- https://www.threatfabric.com/blogs/the-rage-of-android-banking-trojans.html - webarchive
- https://intel471.com/blog/china-cybercrime-undergrond-deepmix-tea-horse-road-great-firewall/ - webarchive
- https://sysopfb.github.io/malware,/reverse-engineering/2018/08/30/Unpacking-Anubis-APK.html - webarchive
- https://www.threatfabric.com/blogs/2020_year_of_the_rat.html - webarchive
- https://eybisi.run/Mobile-Malware-Analysis-Tricks-used-in-Anubis/ - webarchive
- https://securityboulevard.com/2018/09/android-malware-intercepts-sms-2fa-we-have-the-logs/ - webarchive
- https://info.phishlabs.com/blog/new-variant-bankbot-banking-trojan-aubis - webarchive
- https://0x1c3n.tech/anubis-android-malware-analysis - webarchive
- https://community.riskiq.com/article/85b3db8c - webarchive
- https://www.youtube.com/watch?v=U0UsfO-0uJM - webarchive
- https://blog.trendmicro.com/trendlabs-security-intelligence/google-play-apps-drop-anubis-banking-malware-use-motion-based-evasion-tactics/ - webarchive
- https://securityintelligence.com/after-big-takedown-efforts-20-more-bankbot-mobile-malware-apps-make-it-into-google-play/ - webarchive
- https://www.welivesecurity.com/2017/11/21/new-campaigns-spread-banking-malware-google-play/ - webarchive
- https://n1ght-w0lf.github.io/malware%20analysis/anubis-banking-malware/ - webarchive
- https://securityboulevard.com/2018/09/android-malware-intercepts-sms-2fa-we-have-the-logs/
- http://blog.koodous.com/2017/04/decrypting-bankbot-communications.html - webarchive
- https://securelist.com/mobile-malware-evolution-2019/96280/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
AnubisSpy
Internal MISP references
UUID 06ffb614-33ca-4b04-bf3b-623e68754184
which can be used as unique global reference for AnubisSpy
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/apk.anubisspy - webarchive
- https://documents.trendmicro.com/assets/tech-brief-cyberespionage-campaign-sphinx-goes-mobile-with-anubisspy.pdf - webarchive
- http://blog.trendmicro.com/trendlabs-security-intelligence/cyberespionage-campaign-sphinx-goes-mobile-anubisspy/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Asacub
Internal MISP references
UUID dffa06ec-e94f-4fd7-8578-2a98aace5473
which can be used as unique global reference for Asacub
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Ashas
Internal MISP references
UUID aabcfbb6-6385-486d-a30b-e3a2edcf493d
which can be used as unique global reference for Ashas
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
ATANK
According to Lukas Stefanko, this is an open-source crypto-ransomware found on Github in 2018. IT can en/decrypt files (AES, key: 32 random chars, sent to C&C), uses email as contact point but will remove all files after 24 hours or after a reboot.
Internal MISP references
UUID 231f9f49-6752-49af-9ee0-7774578fcbe4
which can be used as unique global reference for ATANK
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
AxBanker
According to EnigmaSoft, AxBanker is a banking Trojan targeting Android devices specifically. The threatening tool has been deployed as part of large attack campaigns against users in India. The threat actors use smishing (SMS phishing) techniques to smuggle the malware threat onto the victims' devices. The fake applications carrying AxBanker are designed to visually impersonate the official applications of popular Indian banking organizations. The weaponized applications use fake promises or rewards and discounts as additional lures.
Internal MISP references
UUID 4a854e8c-d6ad-4997-8931-b27e39b7f7fa
which can be used as unique global reference for AxBanker
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/apk.axbanker - webarchive
- https://blog.polyswarm.io/phishing-and-android-malware-campaign-targets-indian-banks - webarchive
- https://www.trendmicro.com/en_vn/research/22/k/massive-phishing-campaigns-target-india-banks-clients.html#:~:text=We%20found%20five%20banking%20malware,card%20information%20via%20phishing%20campaigns.&text=We%20observed%20an%20uptick%20in,message%20with%20a%20phishing%20link. - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
badbazaar
BadBazaar is a type of malware primarily functioning as a banking Trojan. Designed to compromise Android devices, it is often distributed through malicious apps downloaded from unofficial app stores or third-party websites. Once installed, BadBazaar seeks to steal financial information and login credentials by intercepting SMS messages, performing screen recordings, and logging keystrokes on the device. Additionally, it can execute remote commands and download and install other malicious applications, further compromising the security of the affected device.
Internal MISP references
UUID 80b30290-40d3-4ce3-a878-2e0af4b107d8
which can be used as unique global reference for badbazaar
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
BADCALL (Android)
remote access tool (RAT) payload on Android devices
Internal MISP references
UUID 5eec00de-5d81-4907-817d-f99cb33d9b66
which can be used as unique global reference for BADCALL (Android)
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
BadPatch
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular BadPatch.
Known Synonyms |
---|
WelcomeChat |
Internal MISP references
UUID 9b96e274-1602-48a4-8e0d-9f756d4e835b
which can be used as unique global reference for BadPatch
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Bahamut (Android)
According to PCrisk, Bahamut is the name of Android malware with spyware functionality. Threat actors use Bahamut to steal sensitive information. The newest malware version targets various messaging apps and personally identifiable information.
Internal MISP references
UUID 4038c3bc-b559-45bb-bac1-9665a54dedf9
which can be used as unique global reference for Bahamut (Android)
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/apk.bahamut - webarchive
- https://www.blackberry.com/us/en/pdfviewer?file=/content/dam/blackberry-com/asset/enterprise/pdf/direct/report-spark-bahamut.pdf - webarchive
- https://www.welivesecurity.com/2022/11/23/bahamut-cybermercenary-group-targets-android-users-fake-vpn-apps/ - webarchive
- https://www.bellingcat.com/news/mena/2017/06/12/bahamut-pursuing-cyber-espionage-actor-middle-east/ - webarchive
- https://blog.cyble.com/2022/06/29/bahamut-android-malware-returns-with-new-spying-capabilities/ - webarchive
- https://www.trendmicro.com/en_us/research/18/h/the-urpage-connection-to-bahamut-confucius-and-patchwork.html - webarchive
- https://blog.trendmicro.com/trendlabs-security-intelligence/the-urpage-connection-to-bahamut-confucius-and-patchwork/ - webarchive
- https://mp.weixin.qq.com/s/YAAybJBAvxqrQWYDg31BBw - webarchive
- https://www.bellingcat.com/resources/case-studies/2017/10/27/bahamut-revisited-cyber-espionage-middle-east-south-asia/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Basbanke
Internal MISP references
UUID c59b65d6-d363-4b19-b082-d72508e782c0
which can be used as unique global reference for Basbanke
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/apk.basbanke - webarchive
- https://securelist.com/basbanke-trend-setting-brazilian-banking-trojan/90365/ - webarchive
- https://twitter.com/LukasStefanko/status/1280243673100402690 - webarchive
- https://seguranca-informatica.pt/hackers-are-again-attacking-portuguese-banking-organizations-via-android-trojan-banker/#.YHTDZS2tEUE - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
BianLian (Android)
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular BianLian (Android).
Known Synonyms |
---|
Hydra |
Internal MISP references
UUID 1faaa5c5-ab4e-4101-b2d9-0e12207d70fc
which can be used as unique global reference for BianLian (Android)
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/apk.bianlian - webarchive
- https://cryptax.medium.com/quick-look-into-a-new-sample-of-android-bianlian-bc5619efa726 - webarchive
- https://cryptax.medium.com/creating-a-safe-dummy-c-c-to-test-android-bots-ffa6e7a3dce5 - webarchive
- https://cryptax.medium.com/bianlian-c-c-domain-name-4f226a29e221 - webarchive
- https://www.youtube.com/watch?v=DPFcvSy4OZk - webarchive
- https://www.threatfabric.com/blogs/bianlian_from_rags_to_riches_the_malware_dropper_that_had_a_dream.html - webarchive
- https://cryptax.medium.com/multidex-trick-to-unpack-android-bianlian-ed52eb791e56 - webarchive
- https://www.fortinet.com/blog/threat-research/new-wave-bianlian-malware.html - webarchive
- https://cryptax.medium.com/bad-zip-and-new-packer-for-android-bianlian-5bdad4b90aeb - webarchive
- https://cryptax.medium.com/android-bianlian-payload-61febabed00a - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
BingoMod
Internal MISP references
UUID 2778f61a-48e4-4585-8eff-983d5a4fd6ac
which can be used as unique global reference for BingoMod
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
BlankBot
Internal MISP references
UUID c4a42580-bc5e-4185-adfd-cc6ade9b8424
which can be used as unique global reference for BlankBot
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
BrasDex
According to PCrisk, BraDex is a banking malware targeting Android operating systems. This malicious program aims to gain access to victims' bank accounts and make fraudulent transactions.
At the time of writing, BrasDex targets Brazilian banking applications exclusively. In previous BrasDex campaigns, it infiltrated devices under the guise of Android system related apps. Lately, this malware has been installed by a fake Brazilian Banco Santander banking application.
Internal MISP references
UUID dc5408e9-e9e8-44fd-ac5c-231483d0ebe3
which can be used as unique global reference for BrasDex
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
BRATA
According to Cleafy, the victim's Android device is factory reset after the attackers siphon money from the victim's bank account. This distracts users from the crime, while removing traces or footprints that might be of interest to forensic analysts.
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular BRATA.
Known Synonyms |
---|
AmexTroll |
Copybara |
Internal MISP references
UUID d9ff080d-cde0-48da-89db-53435c99446b
which can be used as unique global reference for BRATA
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/apk.brata - webarchive
- https://www.threatfabric.com/blogs/toad-fraud - webarchive
- https://www.cleafy.com/cleafy-labs/brata-is-evolving-into-an-advanced-persistent-threat - webarchive
- https://www.advintel.io/post/economic-growth-digital-inclusion-specialized-crime-financial-cyber-fraud-in-latam - webarchive
- https://www.cleafy.com/cleafy-labs/mobile-banking-fraud-brata-strikes-again - webarchive
- https://securelist.com/spying-android-rat-from-brazil-brata/92775/ - webarchive
- https://www.threatfabric.com/blogs/brata-a-tale-of-three-families.html - webarchive
- https://www.cleafy.com/cleafy-labs/how-brata-is-monitoring-your-bank-account - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Brunhilda
PRODAFT describes Brunhilda as a "Dropper as a Service" for Google Play, delivering e.g. Alien.
Internal MISP references
UUID 5d3d5f52-0a55-4c81-af87-7809ce43906b
which can be used as unique global reference for Brunhilda
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/apk.brunhilda - webarchive
- https://blog.fox-it.com/2024/03/28/android-malware-vultur-expands-its-wingspan - webarchive
- https://www.threatfabric.com/blogs/the-attack-of-the-droppers.html - webarchive
- https://www.cleafy.com/cleafy-labs/the-android-malwares-journey-from-google-play-to-banking-fraud - webarchive
- https://www.prodaft.com/m/reports/BrunHilda_DaaS.pdf - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
BusyGasper
Internal MISP references
UUID 4bf68bf8-08e5-46f3-ade5-0bd4f124b168
which can be used as unique global reference for BusyGasper
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
CapraRAT
According to PCrisk, CapraRAT is the name of an Android remote access trojan (RAT), possibly a modified version of another (open-source) RAT called AndroRAT. It is known that CapraRAT is used by an advanced persistent threat group (ATP) called APT36 (also known as Earth Karkaddan). CapraRAT allows attackers to perform certain actions on the infected Android device.
Internal MISP references
UUID 7cd1c5f3-7635-46d2-87f1-e638fb8d714c
which can be used as unique global reference for CapraRAT
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/apk.capra_rat - webarchive
- https://www.sentinelone.com/labs/capratube-transparent-tribes-caprarat-mimics-youtube-to-hijack-android-phones/ - webarchive
- https://www.trendmicro.com/en_us/research/22/a/investigating-apt36-or-earth-karkaddans-attack-chain-and-malware.html - webarchive
- https://www.welivesecurity.com/2023/03/07/love-scam-espionage-transparent-tribe-lures-indian-pakistani-officials/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
CarbonSteal
Internal MISP references
UUID 56090c0b-2b9b-4624-8eff-ef6d3632fd2b
which can be used as unique global reference for CarbonSteal
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Catelites
Catelites Bot (identified by Avast and SfyLabs in December 2017) is an Android trojan, with ties to CronBot. Once the malicious app is installed, attackers use social engineering tricks and window overlays to get credit card details from the victim. The distribution vector seems to be fake apps from third-party app stores (not Google Play) or via malvertisement. After installation and activation, the app creates fake Gmail, Google Play and Chrome icons. Furthermore, the malware sends a fake system notification, telling the victim that they need to re-authenticate with Google Services and ask for their credit card details to be entered. Currently the malware has overlays for over 2,200 apps of banks and financial institutions.
Internal MISP references
UUID 2c672b27-bc65-48ba-ba3d-6318473e78b6
which can be used as unique global reference for Catelites
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Cerberus
According to PCrisk, Cerberus is an Android banking Trojan which can be rented on hacker forums. It was been created in 2019 and is used to steal sensitive, confidential information. Cerberus can also be used to send commands to users' devices and perform dangerous actions.
Internal MISP references
UUID c3a2448f-bb41-4201-b524-3ddcb02ddbf4
which can be used as unique global reference for Cerberus
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/apk.cerberus - webarchive
- https://twitter.com/AndroidCerberus - webarchive
- https://cyberint.com/blog/research/cerberus-is-dead-long-live-cerberus/ - webarchive
- https://github.com/ics-iot-bootcamp/cerberus_research - webarchive
- https://www.forbes.com/sites/zakdoffman/2019/08/16/dangerous-new-android-trojan-hides-from-malware-researchers-and-taunts-them-on-twitter/ - webarchive
- https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2022/04/12075509/EN_The-State-of-Stalkerware-2021.pdf - webarchive
- https://labs.bitdefender.com/2020/09/apps-on-google-play-tainted-with-cerberus-banker-malware/ - webarchive
- https://insights.oem.avira.com/in-depth-analysis-of-a-cerberus-trojan-variant/ - webarchive
- https://resecurity.com/blog/article/in-the-box-mobile-malware-webinjects-marketplace - webarchive
- https://go.recordedfuture.com/hubfs/reports/cta-2020-1016.pdf - webarchive
- https://bushidotoken.blogspot.com/2020/05/turkey-targeted-by-cerberus-and-anubis.html - webarchive
- https://www.threatfabric.com/blogs/ermac-another-cerberus-reborn.html - webarchive
- https://securelist.com/the-state-of-stalkerware-in-2021/106193/ - webarchive
- https://www.threatfabric.com/blogs/2020_year_of_the_rat.html - webarchive
- https://www.threatfabric.com/blogs/alien_the_story_of_cerberus_demise.html - webarchive
- https://nur.pub/cerberus-analysis - webarchive
- https://preyproject.com/blog/en/cerberus-and-alien-the-malware-that-has-put-android-in-a-tight-spot/ - webarchive
- https://www.biznet.com.tr/wp-content/uploads/2020/08/Cerberus.pdf - webarchive
- https://community.riskiq.com/article/85b3db8c - webarchive
- https://www.threatfabric.com/blogs/cerberus-a-new-banking-trojan-from-the-underworld.html - webarchive
- https://www.slideshare.net/codeblue_jp/cb19-cyber-threat-landscape-in-japan-revealing-threat-in-the-shadow-by-chi-en-shen-ashley-oleg-bondarenko - webarchive
- https://blog.cyberint.com/cerberus-is-dead-long-live-cerberus - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Chameleon
The malware chamaleon is an Android trojan that pretends to be legitimate entities to steal data from users in Australia and Poland. It exploits the Accessibility Service to monitor and modify the device screen.
Internal MISP references
UUID 90b3a256-311d-416b-b333-e02b910ba75d
which can be used as unique global reference for Chameleon
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/apk.chameleon - webarchive
- https://blog.cyble.com/2023/04/13/chameleon-a-new-android-malware-spotted-in-the-wild/ - webarchive
- https://www.threatfabric.com/blogs/chameleon-is-now-targeting-employees-masquerading-as-crm-app - webarchive
- https://www.threatfabric.com/blogs/android-banking-trojan-chameleon-is-back-in-action - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Chamois
Internal MISP references
UUID 2e230ff8-3971-4168-a966-176316cbdbf2
which can be used as unique global reference for Chamois
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/apk.chamois - webarchive
- https://android-developers.googleblog.com/2017/03/detecting-and-eliminating-chamois-fraud.html - webarchive
- https://github.com/maddiestone/ConPresentations/blob/master/KasperskySAS2019.Chamois.pdf - webarchive
- https://www.virusbulletin.com/virusbulletin/2019/01/vb2018-paper-unpacking-packed-unpacker-reversing-android-anti-analysis-native-library/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Charger
Internal MISP references
UUID 6e0545df-8df6-4990-971c-e96c4c60d561
which can be used as unique global reference for Charger
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/apk.charger - webarchive
- https://www.welivesecurity.com/wp-content/uploads/2019/02/ESET_Android_Banking_Malware.pdf - webarchive
- http://blog.checkpoint.com/2017/01/24/charger-malware/ - webarchive
- https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/ransomware-recap-january-14-29-2017 - webarchive
- http://blog.joesecurity.org/2017/01/deep-analysis-of-android-ransom-charger.html - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Chinotto (Android)
Internal MISP references
UUID 6cc7b402-21cf-4510-be7d-d7f811a57bc1
which can be used as unique global reference for Chinotto (Android)
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Chrysaor
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Chrysaor.
Known Synonyms |
---|
JigglyPuff |
Pegasus |
Internal MISP references
UUID 52acea22-7d88-433c-99e6-8fef1657e3ad
which can be used as unique global reference for Chrysaor
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/apk.chrysaor - webarchive
- https://twitter.com/alexanderjaeger/status/1417447732030189569 - webarchive
- https://www.amnesty.org/en/latest/research/2021/07/forensic-methodology-report-appendix-d/ - webarchive
- https://objective-see.com/blog/blog_0x67.html - webarchive
- https://thewire.in/rights/sar-geelani-pegasus-spyware-phone-messages - webarchive
- https://www.bleepingcomputer.com/news/security/iphones-running-latest-ios-hacked-to-deploy-nso-group-spyware/ - webarchive
- https://www.theguardian.com/news/2021/jul/18/viktor-orban-using-nso-spyware-in-assault-on-media-data-suggests - webarchive
- https://citizenlab.ca/2021/12/pegasus-vs-predator-dissidents-doubly-infected-iphone-reveals-cytrox-mercenary-spyware/ - webarchive
- https://info.lookout.com/rs/051-ESQ-475/images/lookout-pegasus-android-technical-analysis.pdf - webarchive
- https://www.trendmicro.com/en_us/research/21/h/confucius-uses-pegasus-spyware-related-lures-to-target-pakistani.html - webarchive
- https://threatpost.com/nso-pegasus-spyware-bans-apple-accountability/167965/ - webarchive
- https://nex.sx/blog/2021/08/03/the-pegasus-project.html - webarchive
- https://security.googleblog.com/2017/04/an-investigation-of-chrysaor-malware-on.html - webarchive
- https://www.cybertrends.it/pegasus-lo-spyware-per-smartphone-come-funziona-e-come-ci-si-puo-proteggere/ - webarchive
- https://www.amnesty.org/en/latest/news/2021/07/the-pegasus-project/ - webarchive
- https://lifars.com/2022/01/forensics-analysis-of-the-nso-groups-pegasus-spyware/ - webarchive
- https://www.bleepingcomputer.com/news/security/google-predator-spyware-infected-android-devices-using-zero-days/ - webarchive
- https://citizenlab.ca/2022/04/peace-through-pegasus-jordanian-human-rights-defenders-and-journalists-hacked-with-pegasus-spyware/ - webarchive
- https://citizenlab.ca/2021/08/bahrain-hacks-activists-with-nso-group-zero-click-iphone-exploits/ - webarchive
- https://citizenlab.ca/2018/09/hide-and-seek-tracking-nso-groups-pegasus-spyware-to-operations-in-45-countries/ - webarchive
- https://android-developers.googleblog.com/2017/04/an-investigation-of-chrysaor-malware-on.html - webarchive
- https://thewire.in/government/project-pegasus-journalists-ministers-activists-phones-spying - webarchive
- https://citizenlab.ca/2021/07/amnesty-peer-review/ - webarchive
- https://cybergeeks.tech/a-technical-analysis-of-pegasus-for-android-part-3/ - webarchive
- https://cybergeeks.tech/a-technical-analysis-of-pegasus-for-android-part-2/ - webarchive
- https://www.theguardian.com/news/2021/jul/18/revealed-murdered-journalist-number-selected-mexico-nso-client-cecilio-pineda-birto - webarchive
- https://www.washingtonpost.com/technology/2021/07/18/reactions-pegasus-project-nso/ - webarchive
- https://zetter.substack.com/p/pegasus-spyware-how-it-works-and - webarchive
- https://forbiddenstories.org/pegasus-the-new-global-weapon-for-silencing-journalists/ - webarchive
- https://www.theguardian.com/news/series/pegasus-project - webarchive
- https://thewire.in/tag/pegasus-project - webarchive
- https://twitter.com/HackSysTeam/status/1418223814387765258?s=20 - webarchive
- https://www.washingtonpost.com/investigations/interactive/2021/nso-spyware-pegasus-cellphones/ - webarchive
- https://citizenlab.ca/2020/12/the-great-ipwn-journalists-hacked-with-suspected-nso-group-imessage-zero-click-exploit/ - webarchive
- https://www.washingtonpost.com/investigations/2021/07/18/takeaways-nso-pegasus-project/ - webarchive
- https://www.washingtonpost.com/world/2021/07/19/india-nso-pegasus/ - webarchive
- https://unit42.paloaltonetworks.com/strategically-aged-domain-detection/ - webarchive
- https://www.theguardian.com/world/2021/jul/18/nso-spyware-used-to-target-family-of-jamal-khashoggi-leaked-data-shows-saudis-pegasus - webarchive
- https://thewire.in/media/pegasus-project-spyware-indian-journalists - webarchive
- https://www.theguardian.com/world/2021/jul/18/revealed-leak-uncovers-global-abuse-of-cyber-surveillance-weapon-nso-group-pegasus - webarchive
- https://www.washingtonpost.com/investigations/interactive/2021/jamal-khashoggi-wife-fiancee-cellphone-hack/?itid=co_pegasus_5 - webarchive
- https://citizenlab.ca/2021/11/palestinian-human-rights-defenders-hacked-nso-groups-pegasus-spyware/ - webarchive
- https://github.com/AmnestyTech/investigations/tree/master/2021-07-18_nso - webarchive
- https://media.ccc.de/v/33c3-7901-pegasus_internals - webarchive
- https://forbiddenstories.org/the-pegasus-project-a-worldwide-collaboration-to-counter-a-global-crime/ - webarchive
- https://www.cyjax.com/2021/10/26/mercenary-apts-an-exploration/ - webarchive
- https://citizenlab.ca/2021/10/breaking-news-new-york-times-journalist-ben-hubbard-pegasus/ - webarchive
- https://therecord.media/mexican-army-spyware - webarchive
- https://www.amnesty.org/en/latest/research/2021/07/forensic-methodology-report-how-to-catch-nso-groups-pegasus/ - webarchive
- https://www.reuters.com/technology/how-saudi-womans-iphone-revealed-hacking-around-world-2022-02-17/ - webarchive
- https://twitter.com/billmarczak/status/1416801439402262529 - webarchive
- https://www.trendmicro.com/en_us/research/21/i/analyzing-pegasus-spywares-zero-click-iphone-exploit-forcedentry.html - webarchive
- https://thewire.in/government/indian-army-bsf-raw-pegasus-spyware-threat - webarchive
- https://blog.zecops.com/research/the-recent-ios-0-click-cve-2021-30860-sounds-familiar-an-unreleased-write-up-one-year-later/ - webarchive
- https://www.washingtonpost.com/technology/2021/07/19/apple-iphone-nso/ - webarchive
- https://irpimedia.irpi.eu/sorveglianze-cy4gate/ - webarchive
- https://www.iverify.io/post/clipping-wings-our-analysis-of-a-pegasus-spyware-sample - webarchive
- https://citizenlab.ca/2020/01/stopping-the-press-new-york-times-journalist-targeted-by-saudi-linked-pegasus-spyware-operator/ - webarchive
- https://forbiddenstories.org/about-the-pegasus-project/ - webarchive
- https://www.vice.com/en/article/xgx5bw/amazon-aws-shuts-down-nso-group-infrastructure - webarchive
- https://googleprojectzero.blogspot.com/2021/12/a-deep-dive-into-nso-zero-click.html - webarchive
- https://ti.qianxin.com/uploads/2020/02/13/cb78386a082f465f259b37dae5df4884.pdf - webarchive
- https://www.lemonde.fr/projet-pegasus/article/2021/07/18/au-maroc-comme-en-france-des-journalistes-mis-sous-surveillance-avec-le-logiciel-pegasus_6088654_6088648.html - webarchive
- https://citizenlab.ca/2022/04/catalangate-extensive-mercenary-spyware-operation-against-catalans-using-pegasus-candiru/ - webarchive
- https://cybergeeks.tech/a-technical-analysis-of-pegasus-for-android-part-1 - webarchive
- https://arkadiyt.com/2021/07/25/scanning-your-iphone-for-nso-group-pegasus-malware/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Clientor
Internal MISP references
UUID c0a48ca3-682d-45bc-805c-e62aecd4c724
which can be used as unique global reference for Clientor
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Clipper
Internal MISP references
UUID ff9b47c6-a5b5-4531-abfc-2e4db3dcdc7e
which can be used as unique global reference for Clipper
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/apk.clipper - webarchive
- https://news.drweb.com/show?lng=en&i=12739 - webarchive
- https://www.welivesecurity.com/2019/02/08/first-clipper-malware-google-play/ - webarchive
- https://lukasstefanko.com/2019/02/android-clipper-found-on-google-play.html - webarchive
- https://web.archive.org/web/20201107225915/https://lukasstefanko.com/2019/02/android-clipper-found-on-google-play.html - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
CloudAtlas
Internal MISP references
UUID ed780667-b67c-4e17-ab43-db1b7e018e66
which can be used as unique global reference for CloudAtlas
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
CometBot
Internal MISP references
UUID 151bf399-aa8f-4160-b9b5-8fe222f2a6b1
which can be used as unique global reference for CometBot
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Connic
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Connic.
Known Synonyms |
---|
SpyBanker |
Internal MISP references
UUID 93b1c63a-4a34-44fd-805b-0a3470ff7e6a
which can be used as unique global reference for Connic
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Coper
Coper is a descendant of ExoBotCompat, which was a rewritten version of Exobot. Malicious Coper apps have a modular architecture and a multi-stage infection mechanism. Coper has originally been spotted in Colombia but has since emerged in Europa as well.
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Coper.
Known Synonyms |
---|
ExobotCompact |
Octo |
Internal MISP references
UUID 70973ef7-e031-468f-9420-d8aa4eb7543a
which can be used as unique global reference for Coper
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/apk.coper - webarchive
- https://x.com/cleafylabs/status/1833145006585987374 - webarchive
- https://labs.k7computing.com/index.php/play-store-app-serves-coper-via-github/ - webarchive
- https://threatfabric.com/blogs/octo-new-odf-banking-trojan.html - webarchive
- https://thehackernews.com/2022/04/new-octo-banking-trojan-spreading-via.html - webarchive
- https://cert-agid.gov.it/news/analisi-e-approfondimenti-tecnici-sul-malware-coper-utilizzato-per-attaccare-dispositivi-mobili/ - webarchive
- https://cert.pl/posts/2021/12/aktywacja-aplikacji-iko/ - webarchive
- https://blog.cyble.com/2022/03/24/coper-banking-trojan/ - webarchive
- https://www.threatfabric.com/blogs/octo2-european-banks-already-under-attack-by-new-malware-variant - webarchive
- https://www.trendmicro.com/en_us/research/22/g/examining-new-dawdropper-banking-dropper-and-daas-on-the-dark-we.html - webarchive
- https://resecurity.com/blog/article/in-the-box-mobile-malware-webinjects-marketplace - webarchive
- https://www.bleepingcomputer.com/news/security/new-android-banking-malware-remotely-takes-control-of-your-device/ - webarchive
- https://www.team-cymru.com/post/coper-octo-a-conductor-for-mobile-mayhem-with-eight-limbs - webarchive
- https://twitter.com/icebre4ker/status/1541875982684094465 - webarchive
- https://www.domaintools.com/resources/blog/uncovering-octo2-domains/ - webarchive
- https://news.drweb.com/show/?p=0&lng=en&i=14259&c=0 - webarchive
- https://info.spamhaus.com/hubfs/Botnet%20Reports/Jan-Jun%202024%20Botnet%20Threat%20Update.pdf - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Copybara
Internal MISP references
UUID e3d07fda-d29d-42e4-a0d6-5827b2d14d17
which can be used as unique global reference for Copybara
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/apk.copybara - webarchive
- https://www.threatfabric.com/blogs/toad-fraud - webarchive
- https://www.threatfabric.com/blogs/brata-a-tale-of-three-families - webarchive
- https://www.cleafy.com/cleafy-labs/on-device-fraud-on-the-rise-exposing-a-recent-copybara-fraud-campaign - webarchive
- https://www.threatfabric.com/blogs/brata-a-tale-of-three-families.html - webarchive
- https://www.zscaler.com/blogs/security-research/technical-analysis-copybara - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Coronavirus Android Worm
Poses as an app that can offer a "corona safety mask" but phone's address book and sends sms to contacts, spreading its own download link.
Internal MISP references
UUID f041032e-01af-4e66-9fb2-f8da88a6ea35
which can be used as unique global reference for Coronavirus Android Worm
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/apk.corona_worm - webarchive
- https://www.zscaler.com/blogs/research/new-android-app-offers-coronavirus-safety-mask-delivers-sms-trojan - webarchive
- https://dissectingmalwa.re/jamba-superdeal-helo-sir-you-want-to-buy-mask-corona-safety-mask-sms-scam.html - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Cpuminer (Android)
Internal MISP references
UUID 8a42a699-1746-498b-a558-e7113bb916c0
which can be used as unique global reference for Cpuminer (Android)
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
CraxsRAT
Internal MISP references
UUID 1f7a8a57-f3e2-4e4b-a4d7-8eb0ba9243c5
which can be used as unique global reference for CraxsRAT
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
CryCryptor
According to NHS Digital, CryCryptor is distributed via websites that spoof health organisations. At the time of publication these websites have affected the Canadian health service. CryCryptor cannot be obtained from the Google Play store, so devices restricted to only running apps from the store are not affected.
When CryCryptor is run it encrypts common file types and saves a ransom note to every directory where files have been encrypted. Encrypted files have the extension '.enc' appended to the filenames. Additional files are saved containing the salt values used in each encryption and an initialisation vector. These files have the extensions '.enc.salt' and '.enc.iv' respectively.
When files have been encrypted, a notification is displayed directing users to open the ransom note.
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular CryCryptor.
Known Synonyms |
---|
CryCrypter |
CryDroid |
Internal MISP references
UUID 21e9d7e6-6e8c-49e4-8869-6bac249cda8a
which can be used as unique global reference for CryCryptor
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
CyberAzov
Internal MISP references
UUID bb1821f9-eace-4e63-b55d-fc7821a6e5f1
which can be used as unique global reference for CyberAzov
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/apk.cyber_azov - webarchive
- https://twitter.com/sekoia_io/status/1554086468104196096 - webarchive
- https://blog.google/threat-analysis-group/continued-cyber-activity-in-eastern-europe-observed-by-tag/ - webarchive
- https://blog.google/threat-analysis-group/continued-cyber-activity-in-eastern-europe-observed-by-tag - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
DAAM
According to PCrisk, DAAM is an Android malware utilized to gain unauthorized access to targeted devices since 2021. With the DAAM Android botnet, threat actors can bind harmful code with a genuine application using its APK binding service.
Lookout refers to this malware as BouldSpy and assesses with medium confidence that this Android surveillance tool is used by the Law Enforcement Command of the Islamic Republic of Iran (FARAJA).
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular DAAM.
Known Synonyms |
---|
BouldSpy |
Internal MISP references
UUID 37a3b62e-99da-47d7-81fb-78f745427b16
which can be used as unique global reference for DAAM
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Dark Shades
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Dark Shades.
Known Synonyms |
---|
Rogue |
Internal MISP references
UUID 97fe35c9-f50c-495f-8736-0ecd95c70192
which can be used as unique global reference for Dark Shades
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
DawDropper
Internal MISP references
UUID bd9756da-220d-48d6-a4f5-6646558c4b30
which can be used as unique global reference for DawDropper
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
DEFENSOR ID
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular DEFENSOR ID.
Known Synonyms |
---|
Defensor Digital |
Internal MISP references
UUID 76346e4d-d14e-467b-9409-82b28a4d6cd6
which can be used as unique global reference for DEFENSOR ID
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/apk.defensor_id - webarchive
- https://www.welivesecurity.com/2020/05/22/insidious-android-malware-gives-up-all-malicious-features-but-one-gain-stealth/ - webarchive
- https://www.welivesecurity.com/wp-content/uploads/2020/07/ESET_Threat_Report_Q22020.pdf - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Dendroid
Internal MISP references
UUID 89989df2-e8bc-4074-a8a2-130a15d6625f
which can be used as unique global reference for Dendroid
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/apk.dendroid - webarchive
- https://community.broadcom.com/symantecenterprise/communities/community-home/librarydocuments/viewdocument?DocumentKey=a29d7d7a-f150-46cf-9bb9-a1f9f4d32a80&CommunityKey=1ecf5f55-9545-44d6-b0f4-4e4a7f5f5e68&tab=librarydocuments - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
dmsSpy
Internal MISP references
UUID 72a25832-4bf4-4505-a77d-8c0fc52dc85d
which can be used as unique global reference for dmsSpy
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/apk.dmsspy - webarchive
- https://documents.trendmicro.com/assets/Tech-Brief-Operation-Poisoned-News-Hong-Kong-Users-Targeted-with-Mobile-Malware-via-Local-News-Links.pdf - webarchive
- https://blog.trendmicro.com/trendlabs-security-intelligence/operation-poisoned-news-hong-kong-users-targeted-with-mobile-malware-via-local-news-links/ - webarchive
- https://securelist.com/ios-exploit-chain-deploys-lightspy-malware/96407/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
DoubleAgent
Internal MISP references
UUID 73fd1bda-e4aa-4777-a628-07580bc070f4
which can be used as unique global reference for DoubleAgent
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
DoubleLocker
Internal MISP references
UUID 10d0115a-00b4-414e-972b-8320a2bb873c
which can be used as unique global reference for DoubleLocker
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Dracarys
Android malware that impersonates genuine applications such as Signal, Telegram, WhatsApp, YouTube, and other chat applications and distributes through phishing sites.
Internal MISP references
UUID bf94eee6-2274-40f4-b181-2b49ce6ef9fb
which can be used as unique global reference for Dracarys
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
DragonEgg
Android variant of ios.LightSpy.
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular DragonEgg.
Known Synonyms |
---|
LightSpy |
Internal MISP references
UUID 4ef28f14-17f4-4f87-a292-e63b42027c8c
which can be used as unique global reference for DragonEgg
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
DroidJack
Internal MISP references
UUID 8990cec7-ddd8-435e-97d6-5b36778e86fe
which can be used as unique global reference for DroidJack
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
DroidWatcher
Internal MISP references
UUID 15f3e50b-9fa5-4eab-ac2b-928e9ce03b72
which can be used as unique global reference for DroidWatcher
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
DualToy (Android)
Internal MISP references
UUID 8269e779-db23-4c94-aafb-36ee94879417
which can be used as unique global reference for DualToy (Android)
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Dvmap
Internal MISP references
UUID e5de818e-d25d-47a8-ab31-55fc992bf91b
which can be used as unique global reference for Dvmap
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Elibomi
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Elibomi.
Known Synonyms |
---|
Drinik |
Internal MISP references
UUID 63cc0b01-c92e-40e7-8669-48d10a490ffb
which can be used as unique global reference for Elibomi
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/apk.elibomi - webarchive
- https://blog.cyble.com/2021/09/07/fake-income-tax-application-targets-indian-taxpayers/ - webarchive
- https://www.mcafee.com/blogs/other-blogs/mcafee-labs/phishing-android-malware-targets-taxpayers-in-india/ - webarchive
- https://www.trendmicro.com/en_vn/research/22/k/massive-phishing-campaigns-target-india-banks-clients.html#:~:text=We%20found%20five%20banking%20malware,card%20information%20via%20phishing%20campaigns.&text=We%20observed%20an%20uptick%20in,message%20with%20a%20phishing%20link. - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
ERMAC
According to Intel471, ERMAC, an Android banking trojan enables bad actors to determine when certain apps are launched and then overwrites the screen display to steal the user's credentials
Internal MISP references
UUID 602944f4-a86c-4a05-b98f-cfb525fb8896
which can be used as unique global reference for ERMAC
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/apk.ermac - webarchive
- https://research.nccgroup.com/2023/09/11/from-ermac-to-hook-investigating-the-technical-differences-between-two-android-malware-variants/ - webarchive
- https://www.threatfabric.com/blogs/ermac-another-cerberus-reborn.html - webarchive
- https://twitter.com/ShilpeshTrivedi/status/1709096404835356883 - webarchive
- https://resecurity.com/blog/article/in-the-box-mobile-malware-webinjects-marketplace - webarchive
- https://twitter.com/ESETresearch/status/1445618031464357888 - webarchive
- https://intel471.com/blog/rmac-2-0-perfecting-the-art-of-account-takeover - webarchive
- https://blog.cyble.com/2022/05/25/ermac-back-in-action/ - webarchive
- https://www.threatfabric.com/blogs/zombinder-ermac-and-desktop-stealers.html - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
ErrorFather
ErrorFather is an Android banking trojan with a multi-stage dropper. The final payload is derived from the Cerberus source code leak.
Internal MISP references
UUID 2c7f6a97-4469-4f97-9a69-5549282a94a6
which can be used as unique global reference for ErrorFather
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Eventbot
According to ThreatFabric, the app overlays 15 financial targets from UK, Italy, and Spain, sniffs 234 apps from banks located in Europe as well as crypto wallets.
Internal MISP references
UUID 5a6fb8cd-d582-4c8c-b7e0-a5b4cf4f248f
which can be used as unique global reference for Eventbot
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
ExoBot
Internal MISP references
UUID c9f2b058-6c22-462a-a20a-fca933a597dd
which can be used as unique global reference for ExoBot
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/apk.exobot - webarchive
- https://threatfabric.com/blogs/octo-new-odf-banking-trojan.html - webarchive
- https://www.bleepingcomputer.com/news/security/exobot-author-calls-it-quits-and-sells-off-banking-trojan-source-code/ - webarchive
- https://securityintelligence.com/ibm-x-force-delves-into-exobots-leaked-source-code/ - webarchive
- https://blog.cyble.com/2022/03/24/coper-banking-trojan/ - webarchive
- https://www.bleepingcomputer.com/news/security/new-exo-android-trojan-sold-on-hacking-forums-dark-web/ - webarchive
- https://www.bleepingcomputer.com/news/security/new-android-banking-malware-remotely-takes-control-of-your-device/ - webarchive
- https://www.bleepingcomputer.com/news/security/source-code-for-exobot-android-banking-trojan-leaked-online/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Exodus
Internal MISP references
UUID 462bc006-b7bd-4e10-afdb-52baf86121e8
which can be used as unique global reference for Exodus
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/apk.exodus - webarchive
- https://ti.qianxin.com/uploads/2020/02/13/cb78386a082f465f259b37dae5df4884.pdf - webarchive
- https://motherboard.vice.com/en_us/article/43z93g/hackers-hid-android-malware-in-google-play-store-exodus-esurv - webarchive
- https://motherboard.vice.com/en_us/article/eveeq4/prosecutors-investigation-esurv-exodus-malware-on-google-play-store - webarchive
- https://securitywithoutborders.org/blog/2019/03/29/exodus.html - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
FaceStealer
Facebook Credential Stealer.
Internal MISP references
UUID c35ebd96-d2f8-4add-b86f-f552ed5dfa9b
which can be used as unique global reference for FaceStealer
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/apk.facestealer - webarchive
- https://www.trendmicro.com/en_us/research/22/e/fake-mobile-apps-steal-facebook-credentials--crypto-related-keys.html - webarchive
- https://labs.k7computing.com/index.php/facestealer-the-rise-of-facebook-credential-stealer-malware/ - webarchive
- https://threatpost.com/facestealer-trojan-google-play-facebook/179015/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
FakeAdBlocker
Internal MISP references
UUID d0ae2b6b-5137-4b64-be3e-4bbc9aa007a6
which can be used as unique global reference for FakeAdBlocker
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Fakecalls
According to Kaspersky, Fakecalls is a Trojan that masquerades as a banking app and imitates phone conversations with bank employees.
Internal MISP references
UUID 014aeab6-2292-4ee5-83d6-fffb0fc21423
which can be used as unique global reference for Fakecalls
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
FakeDefend
Internal MISP references
UUID 8ea1fc8c-ec66-4d39-b32a-da69d3277da4
which can be used as unique global reference for FakeDefend
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
FakeSpy
Internal MISP references
UUID dd821edd-901b-4a5e-b35f-35bb811964ab
which can be used as unique global reference for FakeSpy
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/apk.fakespy - webarchive
- https://blog.trendmicro.com/trendlabs-security-intelligence/a-look-into-the-connection-between-xloader-and-fakespy-and-their-possible-ties-with-the-yanbian-gang/ - webarchive
- https://www.trendmicro.com/en_us/research/18/f/fakespy-android-information-stealing-malware-targets-japanese-and-korean-speaking-users.html - webarchive
- https://blog.trendmicro.com/trendlabs-security-intelligence/fakespy-android-information-stealing-malware-targets-japanese-and-korean-speaking-users/ - webarchive
- https://medium.com/csis-techblog/the-roamingmantis-groups-expansion-to-european-apple-accounts-and-android-devices-e6381723c681 - webarchive
- https://www.trendmicro.com/en_us/research/18/k/a-look-into-the-connection-between-xloader-and-fakespy-and-their-possible-ties-with-the-yanbian-gang.html - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
FakeGram
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular FakeGram.
Known Synonyms |
---|
FakeTGram |
Internal MISP references
UUID 6c0fc7e4-4629-494f-b471-f7a8cc47c0e0
which can be used as unique global reference for FakeGram
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
FastFire
Internal MISP references
UUID 5613da3a-06f5-4363-b468-0b8a03ffc292
which can be used as unique global reference for FastFire
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
FastSpy
Internal MISP references
UUID a5e3e217-3790-4d7c-b67a-906b9ee69034
which can be used as unique global reference for FastSpy
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
FileCoder
According to heimdal, A new strain of ransomware emerged on Android mobile devices. It targets those who are running the operating system Android 5.1 and higher. This Android ransomware strain has been dubbed by security researchers FileCoder (Android/Filecoder.c) and it spreads via text messages containing a malicious link.
Internal MISP references
UUID 09ff3520-b643-44bd-a0de-90c0e75ba12f
which can be used as unique global reference for FileCoder
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
FinFisher (Android)
Internal MISP references
UUID 0bf7acd4-6493-4126-9598-d2ed069e32eb
which can be used as unique global reference for FinFisher (Android)
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/apk.finfisher - webarchive
- https://github.com/linuzifer/FinSpy-Dokumentation - webarchive
- https://securelist.com/new-finspy-ios-and-android-implants-revealed-itw/91685/ - webarchive
- https://securelist.com/finspy-unseen-findings/104322/ - webarchive
- https://www.amnesty.org/en/latest/research/2020/09/german-made-finspy-spyware-found-in-egypt-and-mac-and-linux-versions-revealed/ - webarchive
- https://raw.githubusercontent.com/DefensiveLabAgency/FinSpy-for-Android/master/20200806_finspy_android_analysis_public_release.pdf - webarchive
- https://netzpolitik.org/2020/our-criminal-complaint-german-state-malware-company-finfisher-raided/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
FlexiSpy (Android)
Internal MISP references
UUID 4305d59a-0d07-4021-a902-e7996378898b
which can be used as unique global reference for FlexiSpy (Android)
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
FlexNet
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular FlexNet.
Known Synonyms |
---|
gugi |
Internal MISP references
UUID 80d7d229-b3a7-4205-8304-f7b18bda129f
which can be used as unique global reference for FlexNet
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
FluBot
PRODAFT describes FluBot as a banking malware which originally targeted Spain. Since the first quarter of 2021 it has been targeting many other European countries as well as Japan. It uses a DGA for it's C&C and relies on both DNS and DNS-over-HTTPS for name resolution. Despite arrests of multiple people suspected of involvement with this malware in March of 2021, the campaign has only intensified since.
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular FluBot.
Known Synonyms |
---|
Cabassous |
FakeChat |
Internal MISP references
UUID ef91833f-3334-4955-9218-f106494e9fc0
which can be used as unique global reference for FluBot
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/apk.flubot - webarchive
- https://blog.fox-it.com/2022/06/29/flubot-the-evolution-of-a-notorious-android-banking-malware/ - webarchive
- https://mobile.twitter.com/alberto__segura/status/1400396365759500289 - webarchive
- https://www.bitsight.com/blog/flubot-malware-persists-most-prevalent-germany-and-spain - webarchive
- https://www.checkpoint.com/press/2022/march-2022s-most-wanted-malware-easter-phishing-scams-help-emotet-assert-its-dominance/ - webarchive
- https://labs.bitdefender.com/2021/06/threat-actors-use-mockups-of-popular-apps-to-spread-teabot-and-flubot-malware-on-android/ - webarchive
- https://securityintelligence.com/posts/story-of-fakechat-malware/ - webarchive
- https://therecord.media/flubot-malware-gang-arrested-in-barcelona/ - webarchive
- https://twitter.com/malwrhunterteam/status/1359939300238983172 - webarchive
- https://www.threatfabric.com/blogs/partners-in-crime-medusa-cabassous.html - webarchive
- https://hispasec.com/resources/FedexBanker.pdf - webarchive
- https://info.spamhaus.com/hubfs/Botnet%20Reports/2023%20Q1%20Botnet%20Threat%20Update.pdf - webarchive
- https://twitter.com/alberto__segura/status/1395675479194095618 - webarchive
- https://twitter.com/alberto__segura/status/1404098461440659459 - webarchive
- https://www.cert.govt.nz/individuals/news-and-events/parcel-delivery-text-message-infecting-android-phones/ - webarchive
- https://blog.cyble.com/2021/09/09/flubot-variant-masquerading-as-the-default-android-voicemail-app/ - webarchive
- https://news.netcraft.com/archives/2021/08/04/flubot-malware-spreads-to-australia.html - webarchive
- https://medium.com/walmartglobaltech/a-look-at-an-android-bot-from-unpacking-to-dga-e331554f9fb9 - webarchive
- https://news.netcraft.com/archives/2021/08/17/resurgent-flubot-malware-targets-german-and-polish-banks.html - webarchive
- https://www.nortonlifelock.com/blogs/research-group/flubot-targets-android-phone-users - webarchive
- https://www.prodaft.com/m/reports/FluBot_4.pdf - webarchive
- https://www.bitdefender.com/blog/labs/new-flubot-and-teabot-global-malware-campaigns-discovered - webarchive
- https://www.europol.europa.eu/media-press/newsroom/news/takedown-of-sms-based-flubot-spyware-infecting-android-phones - webarchive
- https://thehackernews.com/2022/01/widespread-flubot-and-teabot-malware.html - webarchive
- https://info.spamhaus.com/hubfs/Botnet%20Reports/Jan-Jun%202024%20Botnet%20Threat%20Update.pdf - webarchive
- https://twitter.com/alberto__segura/status/1399249798063087621?s=20 - webarchive
- https://info.spamhaus.com/hubfs/Botnet%20Reports/2023%20Q3%20Botnet%20Threat%20Update.pdf - webarchive
- https://www.infinitumit.com.tr/flubot-zararlisi/ - webarchive
- https://therecord.media/despite-arrests-in-spain-flubot-operations-explode-across-europe-and-japan/ - webarchive
- https://twitter.com/alberto__segura/status/1402615237296148483 - webarchive
- https://www.telekom.com/en/blog/group/article/flubot-under-the-microscope-636368 - webarchive
- https://www.f5.com/labs/articles/threat-intelligence/flubots-authors-employ-creative-and-sophisticated-techniques-to-achieve-their-goals-in-version-50-and-beyond - webarchive
- https://blog.zimperium.com/flubot-vs-zimperium/ - webarchive
- https://twitter.com/alberto__segura/status/1384840011892285440 - webarchive
- https://raw.githubusercontent.com/prodaft/malware-ioc/master/FluBot/FluBot.pdf - webarchive
- https://securityblog.switch.ch/2021/06/19/android-flubot-enters-switzerland/ - webarchive
- https://www.ncsc.admin.ch/22w12-de - webarchive
- https://info.spamhaus.com/hubfs/Botnet%20Reports/2022%20Q3%20Botnet%20Threat%20Update.pdf - webarchive
- https://info.spamhaus.com/hubfs/Botnet%20Reports/Q4%202023%20Botnet%20Threat%20Update.pdf - webarchive
- https://cryptax.medium.com/android-flubot-preparing-for-a-new-campaign-2f7563fc6c06 - webarchive
- https://www.proofpoint.com/us/blog/threat-insight/flubot-android-malware-spreading-rapidly-through-europe-may-hit-us-soon - webarchive
- https://blog.nviso.eu/2021/04/19/how-to-analyze-mobile-malware-a-cabassous-flubot-case-study/ - webarchive
- https://medium.com/csis-techblog/the-brief-glory-of-cabassous-flubot-a-private-android-banking-botnet-bc2ed7917027 - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
FluHorse
According to Check Point, this malware features several malicious Android applications that mimic legitimate applications, most of which have more than 1,000,000 installs. These malicious apps steal the victims’ credentials and Two-Factor Authentication (2FA) codes. FluHorse targets different sectors of Eastern Asian markets and is distributed via emails. In some cases, the emails used in the first stage of the attacks belong to high-profile entities. The malware can remain undetected for months making it a persistent, dangerous, and hard-to-spot threat.
Internal MISP references
UUID aeaeb8b2-650e-471d-a901-3c4fbae42854
which can be used as unique global reference for FluHorse
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/apk.fluhorse - webarchive
- https://www.fortinet.com/blog/threat-research/fortinet-reverses-flutter-based-android-malware-fluhorse - webarchive
- https://cryptax.medium.com/inside-kangapack-the-kangaroo-packer-with-native-decryption-3e7e054679c4 - webarchive
- https://research.checkpoint.com/2023/eastern-asian-android-assault-fluhorse/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
FlyTrap
Zimperium notes that this malware has hit more than 10,000 victims in 140+ countries using social media hijacking, 3rd party app stores and sideloading.
Internal MISP references
UUID 24af5bcc-d4bd-42dd-aed4-f994b30b4921
which can be used as unique global reference for FlyTrap
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
FunkyBot
Internal MISP references
UUID bc0d37fa-113a-45ba-8a1c-b9d818e31f27
which can be used as unique global reference for FunkyBot
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/apk.funkybot - webarchive
- https://medium.com/csis-techblog/the-roamingmantis-groups-expansion-to-european-apple-accounts-and-android-devices-e6381723c681 - webarchive
- https://securelist.com/roaming-mantis-part-v/96250/ - webarchive
- https://www.fortinet.com/blog/threat-research/funkybot-malware-targets-japan.html - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
FurBall
According to Check Point, they uncovered an operation dubbed "Domestic Kitten", which uses malicious Android applications to steal sensitive personal information from its victims: screenshots, messages, call logs, surrounding voice recordings, and more. This operation managed to remain under the radar for a long time, as the associated files were not attributed to a known malware family and were only detected by a handful of security vendors.
Internal MISP references
UUID 53282cc8-fefc-47d7-b6a5-a82a05a88f2a
which can be used as unique global reference for FurBall
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/apk.furball - webarchive
- https://www.trendmicro.com/en_us/research/19/f/mobile-cyberespionage-campaign-bouncing-golf-affects-middle-east.html - webarchive
- https://research.checkpoint.com/2021/domestic-kitten-an-inside-look-at-the-iranian-surveillance-operations/ - webarchive
- https://ti.qianxin.com/blog/articles/surprised-by-cyrus-the-great-disclosure-against-Iran-cyrus-attack/ - webarchive
- https://documents.trendmicro.com/assets/appendix-mobile-cyberespionage-campaign-bouncing-golf-affects-middle-east.pdf - webarchive
- https://www.virusbulletin.com/conference/vb2019/abstracts/domestic-kitten-iranian-surveillance-program - webarchive
- https://www.bleepingcomputer.com/news/security/domestic-kitten-apt-operates-in-silence-since-2016/ - webarchive
- https://www.bleepingcomputer.com/news/security/hacking-group-updates-furball-android-spyware-to-evade-detection/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Geost
Internal MISP references
UUID b9639878-733c-4f30-9a13-4680a7e17415
which can be used as unique global reference for Geost
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/apk.geost - webarchive
- https://www.virusbulletin.com/virusbulletin/2019/10/vb2019-paper-geost-botnet-story-discovery-new-android-banking-trojan-opsec-error/ - webarchive
- https://www.gosecure.net/blog/2020/12/02/deep-dive-into-an-obfuscation-as-a-service-for-android-malware/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Ghimob
Internal MISP references
UUID 3d1f2591-05fe-42f4-aaf8-ed1428f17605
which can be used as unique global reference for Ghimob
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
GhostCtrl
Internal MISP references
UUID 3b6c1771-6d20-4177-8be0-12116e254bf5
which can be used as unique global reference for GhostCtrl
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Gigabud
Gigabud is the name of an Android Remote Access Trojan (RAT) Android that can record the victim's screen and steal banking credentials by abusing the Accessibility Service. Gigabud masquerades as banking, shopping, and other applications. Threat actors have been observed using deceptive websites to distribute Gigabud RAT.
Internal MISP references
UUID 8f188382-7a31-46a5-83c6-5991dfe739ee
which can be used as unique global reference for Gigabud
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Ginp
Ginp is a mobile banking software targeting Android devices that was discovered by Kaspersky. The malware is able to steal both user credentials and credit cards numbers by implementing overlay attacks. For this, overlay targets are for example the default SMS application. What makes Ginp a remarkable family is how its operators managed to have it remain undetected over time even and it receiving version upgrades over many years. According to ThreatFabric, Ginp has the following features:
Overlaying: Dynamic (local overlays obtained from the C2) SMS harvesting: SMS listing SMS harvesting: SMS forwarding Contact list collection Application listing Overlaying: Targets list update SMS: Sending Calls: Call forwarding C2 Resilience: Auxiliary C2 list Self-protection: Hiding the App icon Self-protection: Preventing removal Self-protection: Emulation-detection.
Internal MISP references
UUID 77e9ace0-f6e5-4d6e-965a-a653ff626be1
which can be used as unique global reference for Ginp
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/apk.ginp - webarchive
- https://twitter.com/ESETresearch/status/1269945115738542080 - webarchive
- https://www.threatfabric.com/blogs/2020_year_of_the_rat.html - webarchive
- https://www.youtube.com/watch?v=WeL_xSryj8E - webarchive
- https://muha2xmad.github.io/malware-analysis/ginp/ - webarchive
- https://www.kaspersky.com/blog/ginp-trojan-coronavirus-finder/34338/ - webarchive
- https://www.threatfabric.com/blogs/ginp_a_malware_patchwork_borrowing_from_anubis.html - webarchive
- https://securityintelligence.com/posts/ginp-malware-operations-rising-expansions-turkey/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
GlanceLove
Internal MISP references
UUID 24a709ef-c2e4-45ca-90b6-dfa184472f49
which can be used as unique global reference for GlanceLove
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/apk.glancelove - webarchive
- https://www.haaretz.com/israel-news/hamas-cyber-ops-spied-on-israeli-soldiers-using-fake-world-cup-app-1.6241773 - webarchive
- https://securelist.com/breaking-the-weakest-link-of-the-strongest-chain/77562/ - webarchive
- https://www.idf.il/en/minisites/hamas/hamas-uses-fake-facebook-profiles-to-target-israeli-soldiers/ - webarchive
- https://www.clearskysec.com/glancelove/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
GnatSpy
Internal MISP references
UUID a3b6a355-3afe-49ae-9f87-679c6c382943
which can be used as unique global reference for GnatSpy
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
GoatRAT
Internal MISP references
UUID f699d295-1072-418b-8aa2-cb36fbd4c6c7
which can be used as unique global reference for GoatRAT
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Godfather
According to PCrisk, Godfather is the name of an Android malware targeting online banking pages and cryptocurrency exchanges in 16 countries. It opens fake login windows over legitimate applications. Threat actors use Godfather to steal account credentials. Additionally, Godfather can steal SMSs, device information, and other data.
Internal MISP references
UUID 8e95a9d5-08fb-4f11-b70a-622148bd1e62
which can be used as unique global reference for Godfather
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/apk.godfather - webarchive
- https://github.com/LaurieWired/StrangeLoop - webarchive
- https://blog.group-ib.com/godfather-trojan - webarchive
- https://brandefense.io/blog/godfather-android-banking-trojan/ - webarchive
- https://muha2xmad.github.io/malware-analysis/godfather/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
GoldenEagle
Internal MISP references
UUID b7c0c11d-8471-4b10-bbf2-f9c0f30bc27e
which can be used as unique global reference for GoldenEagle
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
GoldenRAT
Internal MISP references
UUID e111fff8-c73c-4069-b804-2d3732653481
which can be used as unique global reference for GoldenRAT
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
GoldDigger
Internal MISP references
UUID 8ff9cde1-627e-4967-8b12-195544f31d83
which can be used as unique global reference for GoldDigger
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
goontact
Internal MISP references
UUID 008ef3f3-579e-4065-ad0a-cf96be00becf
which can be used as unique global reference for goontact
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/apk.goontact - webarchive
- https://blog.lookout.com/lookout-discovers-new-spyware-goontact-used-by-sextortionists-for-blackmail - webarchive
- https://blog.cyble.com/2021/09/03/spyware-variant-disguised-as-korean-video-app-targets-multiple-asian-countries/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
GPlayed
Cisco Talos identifies GPlayed as a malware written in .NET using the Xamarin environment for mobile applications. It is considered powerful because of its capability to adapt after its deployment. In order to achieve this adaptability, the operator has the capability to remotely load plugins, inject scripts and even compile new .NET code that can be executed.
Internal MISP references
UUID 13dc1ec7-aba7-4553-b990-8323405a1d32
which can be used as unique global reference for GPlayed
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Gravity RAT (Android)
Internal MISP references
UUID fed09d31-6378-4e85-b644-5500491dff88
which can be used as unique global reference for Gravity RAT (Android)
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
GriftHorse
Internal MISP references
UUID fe40a0b2-be48-41c5-8814-7fa3a6a993b9
which can be used as unique global reference for GriftHorse
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Guerrilla
Internal MISP references
UUID 57de6ac2-8cf0-4022-aee2-5f76e3dbd503
which can be used as unique global reference for Guerrilla
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Gustuff
Group-IB describes Gustuff as a mobile Android Trojan, which includes potential targets of customers in leading international banks, users of cryptocurrency services, popular ecommerce websites and marketplaces. Gustuff has previously never been reported. Gustuff is a new generation of malware complete with fully automated features designed to steal both fiat and crypto currency from user accounts en masse. The Trojan uses the Accessibility Service, intended to assist people with disabilities. The analysis of Gustuff sample revealed that the Trojan is equipped with web fakes designed to potentially target users of Android apps of top international banks including Bank of America, Bank of Scotland, J.P.Morgan, Wells Fargo, Capital One, TD Bank, PNC Bank, and crypto services such as Bitcoin Wallet, BitPay, Cryptopay, Coinbase etc. Group-IB specialists discovered that Gustuff could potentially target users of more than 100 banking apps, including 27 in the US, 16 in Poland, 10 in Australia, 9 in Germany, and 8 in India and users of 32 cryptocurrency apps.
Internal MISP references
UUID a5e2b65f-2087-465d-bf14-4acf891d5d0f
which can be used as unique global reference for Gustuff
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/apk.gustuff - webarchive
- https://www.threatfabric.com/blogs/the-rage-of-android-banking-trojans.html - webarchive
- https://blog.talosintelligence.com/2019/04/gustuff-targets-australia.html - webarchive
- https://www.group-ib.com/media/gustuff/ - webarchive
- https://www.threatfabric.com/blogs/2020_year_of_the_rat.html - webarchive
- https://gallery.mailchimp.com/c35aef82661dad887b8162a4f/files/e24e8206-a157-4796-a8cb-2b7262cc76e8/CSIS_Threat_Matrix_H1_2019.pdf - webarchive
- https://blog.talosintelligence.com/2019/10/gustuffv2.html - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
HARDRAIN (Android)
Internal MISP references
UUID 0caf0292-b01a-4439-b56f-c75b71900bc0
which can be used as unique global reference for HARDRAIN (Android)
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/apk.hardrain - webarchive
- https://www.us-cert.gov/sites/default/files/publications/MAR-10135536-F.pdf - webarchive
- https://securingtomorrow.mcafee.com/mcafee-labs/android-malware-appears-linked-to-lazarus-cybercrime-group/#sf174581990 - webarchive
- https://unit42.paloaltonetworks.com/unit42-operation-blockbuster-goes-mobile/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
HawkShaw
Internal MISP references
UUID 5ae490bd-84ca-434f-ab34-b87bd38e4523
which can be used as unique global reference for HawkShaw
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
HenBox
Internal MISP references
UUID 0185f9f6-018e-4eb5-a214-d810cb759a38
which can be used as unique global reference for HenBox
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/apk.henbox - webarchive
- https://unit42.paloaltonetworks.com/unit42-henbox-chickens-come-home-roost/ - webarchive
- https://www.virusbulletin.com/virusbulletin/2020/03/vb2019-paper-pulling-pkplug-adversary-playbook-long-standing-espionage-activity-chinese-nation-state-adversary/ - webarchive
- https://unit42.paloaltonetworks.com/pkplug_chinese_cyber_espionage_group_attacking_asia/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Hermit
Lookout states that Hermit is an advanced spyware designed to target iOS and Android mobile devices. It is designed to collect extensive amounts of sensitive data on its victims such as their location, contacts, private messages, photos, call logs, phone conversations, ambient audio recordings, and more.
Internal MISP references
UUID b95f25a0-ba22-4320-95e3-323fbf852846
which can be used as unique global reference for Hermit
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/apk.hermit - webarchive
- https://blog.google/threat-analysis-group/italian-spyware-vendor-targets-users-in-italy-and-kazakhstan/ - webarchive
- https://www.lighthousereports.nl/investigation/revealing-europes-nso - webarchive
- https://de.lookout.com/blog/hermit-spyware-discovery - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
HeroRAT
Internal MISP references
UUID 537f17ac-74e5-440b-8659-d4fdb4af41a6
which can be used as unique global reference for HeroRAT
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
HiddenAd
HiddenAd is a malware that shows ads as overlays on the phone.
Internal MISP references
UUID 171c97ca-6b61-426d-8f72-c099528625e9
which can be used as unique global reference for HiddenAd
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/apk.hiddenad - webarchive
- https://twitter.com/LukasStefanko/status/1136568939239137280 - webarchive
- https://labs.bitdefender.com/2020/03/infected-zoom-apps-for-android-target-work-from-home-users - webarchive
- https://securelist.com/mobile-malware-evolution-2019/96280/ - webarchive
- https://www.welivesecurity.com/wp-content/uploads/2020/07/ESET_Threat_Report_Q22020.pdf - webarchive
- https://www.mcafee.com/blogs/other-blogs/mcafee-labs/new-hiddenads-malware-that-runs-automatically-and-hides-on-google-play-1m-users-affected/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
HilalRAT
RAT, which can be used to extract sensitive information, e.g. contact lists, txt messages, location information.
Internal MISP references
UUID 96bea6aa-3202-4352-8e36-fa05c677c0e8
which can be used as unique global reference for HilalRAT
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Hook
According to ThreatFabric, this is a malware family based on apk.ermac. The name hook is the self-advertised named by its vendor DukeEugene. It provides WebSocket communication and has RAT capabilities.
Internal MISP references
UUID c101bc42-1011-43f6-9d30-629013c318cd
which can be used as unique global reference for Hook
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/apk.hook - webarchive
- https://research.nccgroup.com/2023/09/11/from-ermac-to-hook-investigating-the-technical-differences-between-two-android-malware-variants/ - webarchive
- https://www.sciencedirect.com/science/article/pii/S266628172400088X - webarchive
- https://github.com/0xperator/hookbot_source - webarchive
- https://cebrf.knf.gov.pl/komunikaty/artykuly-csirt-knf/362-ostrzezenia/858-hookbot-a-new-mobile-malware - webarchive
- https://info.spamhaus.com/hubfs/Botnet%20Reports/Q4%202023%20Botnet%20Threat%20Update.pdf - webarchive
- https://www.threatfabric.com/blogs/hook-a-new-ermac-fork-with-rat-capabilities.html - webarchive
- https://info.spamhaus.com/hubfs/Botnet%20Reports/Jan-Jun%202024%20Botnet%20Threat%20Update.pdf - webarchive
- https://medium.com/@joshuapenny88/hostinghunter-series-chang-way-technologies-co-limited-a9ba4fce0f65 - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Hydra
Avira states that Hydra is an Android BankBot variant, a type of malware designed to steal banking credentials. The way it does this is by requesting the user enables dangerous permissions such as accessibility and every time the banking app is opened, the malware is hijacking the user by overwriting the legit banking application login page with a malicious one. The goal is the same, to trick the user to enter his login credentials so that it will go straight to the malware authors.
Internal MISP references
UUID ae25953d-cf7c-4304-9ea2-2ea1498ea035
which can be used as unique global reference for Hydra
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/apk.hydra - webarchive
- https://cryptax.medium.com/quick-look-into-a-new-sample-of-android-bianlian-bc5619efa726 - webarchive
- https://info.spamhaus.com/hubfs/Botnet%20Reports/2023%20Q2%20Botnet%20Threat%20Update.pdf - webarchive
- https://blog.cyble.com/2022/06/13/hydra-android-malware-distributed-via-play-store/ - webarchive
- https://pentest.blog/android-malware-analysis-dissecting-hydra-dropper/ - webarchive
- https://cryptax.medium.com/creating-a-safe-dummy-c-c-to-test-android-bots-ffa6e7a3dce5 - webarchive
- https://muha2xmad.github.io/malware-analysis/hydra/ - webarchive
- https://www.threatfabric.com/blogs/deceive-the-heavens-to-cross-the-sea.html - webarchive
- https://www.threatfabric.com/blogs/2020_year_of_the_rat.html - webarchive
- https://cryptax.medium.com/bianlian-c-c-domain-name-4f226a29e221 - webarchive
- https://resecurity.com/blog/article/in-the-box-mobile-malware-webinjects-marketplace - webarchive
- https://twitter.com/muha2xmad/status/1570788983474638849 - webarchive
- https://www.avira.com/en/blog/avira-labs-research-reveals-hydra-banking-trojan-2-0 - webarchive
- https://medium.com/@joshuapenny88/hostinghunter-series-chang-way-technologies-co-limited-a9ba4fce0f65 - webarchive
- https://cryptax.medium.com/android-bianlian-payload-61febabed00a - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
IPStorm (Android)
Android variant of IPStorm (InterPlanetary Storm).
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular IPStorm (Android).
Known Synonyms |
---|
InterPlanetary Storm |
Internal MISP references
UUID dc0c8824-64ac-4ab2-a0e4-955a14ecc59c
which can be used as unique global reference for IPStorm (Android)
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/apk.ipstorm - webarchive
- https://www.bitdefender.com/files/News/CaseStudies/study/376/Bitdefender-Whitepaper-IPStorm.pdf - webarchive
- https://www.justice.gov/usao-pr/pr/russian-and-moldovan-national-pleads-guilty-operating-illegal-botnet-proxy-service - webarchive
- https://blog.barracuda.com/2020/10/01/threat-spotlight-new-interplanetary-storm-variant-iot/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
IRATA
According to redpiranha, IRATA (Iranian Remote Access Trojan) Android Malware is a new malware detected in the wild. It originates from a phishing attack through SMS. The theme of the message resembles information coming from the government that will ask you to download this malicious application. IRATA can collect sensitive information from your mobile phone including bank details. Since it infects your mobile, it can also gather your SMS messages which then can be used to obtain 2FA tokens.
Internal MISP references
UUID 24fb43b4-d6a6-49c0-a862-4211a245b635
which can be used as unique global reference for IRATA
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
IRRat
Internal MISP references
UUID 3e7c6e8c-46fc-4498-a28d-5b3d144c51cf
which can be used as unique global reference for IRRat
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
JadeRAT
Internal MISP references
UUID 8804e02c-a139-4c3d-8901-03302ca1faa0
which can be used as unique global reference for JadeRAT
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Joker
Joker is one of the most well-known malware families on Android devices. It manages to take advantage of Google’s official app store with the help of its trail signatures which includes updating the virus’s code, execution process, and payload-retrieval techniques. This malware is capable of stealing users’ personal information including contact details, device data, WAP services, and SMS messages.
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Joker.
Known Synonyms |
---|
Bread |
Internal MISP references
UUID aa2ad8f4-3c46-4f16-994b-2a79c7481cac
which can be used as unique global reference for Joker
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/apk.joker - webarchive
- https://www.threatfabric.com/blogs/toad-fraud - webarchive
- https://cryptax.medium.com/live-reverse-engineering-of-a-trojanized-medical-app-android-joker-632d114073c1 - webarchive
- https://www.microsoft.com/security/blog/2022/06/30/toll-fraud-malware-how-an-android-application-can-drain-your-wallet/ - webarchive
- https://labs.k7computing.com/?p=22199 - webarchive
- https://muha2xmad.github.io/malware-analysis/hydra/ - webarchive
- https://web.archive.org/web/20210714010827/https://blog.zimperium.com/joker-is-still-no-laughing-matter/ - webarchive
- https://medium.com/csis-techblog/analysis-of-joker-a-spy-premium-subscription-bot-on-googleplay-9ad24f044451 - webarchive
- https://labs.k7computing.com/index.php/joker-unleashes-itself-again-on-google-play-store/ - webarchive
- https://security.googleblog.com/2020/01/pha-family-highlights-bread-and-friends.html - webarchive
- https://www.trendmicro.com/en_us/research/20/k/an-old-jokers-new-tricks--using-github-to-hide-its-payload.html - webarchive
- https://cryptax.medium.com/tracking-android-joker-payloads-with-medusa-static-analysis-and-patience-672348b81ac2 - webarchive
- https://labs.bitdefender.com/2020/03/android-apps-and-malware-capitalize-on-coronavirus - webarchive
- https://research.checkpoint.com/2020/new-joker-variant-hits-google-play-with-an-old-trick/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
KevDroid
Internal MISP references
UUID 1e1924b5-89cb-408b-bcee-d6aaef7b24e0
which can be used as unique global reference for KevDroid
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/apk.kevdroid - webarchive
- https://blog.talosintelligence.com/2018/04/fake-av-investigation-unearths-kevdroid.html - webarchive
- https://www.pwc.co.uk/cyber-security/assets/cyber-threats-2019-retrospect.pdf - webarchive
- https://researchcenter.paloaltonetworks.com/2018/04/unit42-reaper-groups-updated-mobile-arsenal/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
KnSpy
Internal MISP references
UUID 084ebca7-91da-4d9c-8211-a18f358ac28b
which can be used as unique global reference for KnSpy
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/apk.knspy - webarchive
- https://community.riskiq.com/article/6f60db72 - webarchive
- https://s.tencent.com/research/report/951.html - webarchive
- https://blogs.360.cn/post/APT-C-35_target_at_armed_forces_in_Pakistan.html - webarchive
- https://twitter.com/voodoodahl1/status/1267571622732578816 - webarchive
- https://cybleinc.com/2021/04/21/donot-team-apt-group-is-back-to-using-old-malicious-patterns/ - webarchive
- https://blog.talosintelligence.com/2020/10/donot-firestarter.html - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Koler
Internal MISP references
UUID 4ff34778-de4b-4f48-9184-4975c8ccc3f3
which can be used as unique global reference for Koler
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Konni (Android)
Internal MISP references
UUID d4f90ffc-72cb-49a5-b796-527785f49161
which can be used as unique global reference for Konni (Android)
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
KSREMOTE
Internal MISP references
UUID 196d51bf-cf97-455d-b997-fc3e377f2188
which can be used as unique global reference for KSREMOTE
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
LittleLooter
Internal MISP references
UUID 41cb4397-7ae0-4a9f-894f-47828e768aa9
which can be used as unique global reference for LittleLooter
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/apk.little_looter - webarchive
- https://i.blackhat.com/USA21/Wednesday-Handouts/us-21-The-Kitten-That-Charmed-Me-The-9-Lives-Of-A-Nation-State-Attacker.pdf - webarchive
- https://www.youtube.com/watch?v=nilzxS9rxEM - webarchive
- https://twitter.com/malwrhunterteam/status/1337684036374945792 - webarchive
- https://securityintelligence.com/posts/itg18-operational-security-errors-plague-iranian-threat-group/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Loki
Internal MISP references
UUID a6f481fe-b6db-4507-bb3c-28f10d800e2f
which can be used as unique global reference for Loki
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
LokiBot
Android banker Trojan with the standard banking capabilities such as overlays, SMS stealing. It also features ransomware functionality. Note, the network traffic is obfuscated the same way as in Android Bankbot.
Internal MISP references
UUID 4793a29b-1191-4750-810e-9301a6576fc4
which can be used as unique global reference for LokiBot
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/apk.lokibot - webarchive
- https://www.threatfabric.com/blogs/lokibot_the_first_hybrid_android_malware.html - webarchive
- https://embee-research.ghost.io/infrastructure-analysis-with-dns-pivoting/ - webarchive
- https://muha2xmad.github.io/mal-document/lokibotpdf/ - webarchive
- https://isc.sans.edu/diary/27282 - webarchive
- https://securelist.com/emotet-darkgate-lokibot-crimeware-report/110286/ - webarchive
- https://yoroi.company/research/aggah-how-to-run-a-botnet-without-renting-a-server-for-more-than-a-year/ - webarchive
- https://github.com/vc0RExor/Malware-Threat-Reports/blob/main/Lokibot/Machete-Weapons-Lokibot/Machete%20weapons-Lokibot_EN.pdf - webarchive
- https://news.sophos.com/en-us/2020/07/14/raticate-rats-as-service-with-commercial-crypter/?cmp=30728 - webarchive
- https://www.ptsecurity.com/ww-en/analytics/pt-esc-threat-intelligence/steganoamor-campaign-ta558-mass-attacking-companies-and-public-institutions-all-around-the-world/ - webarchive
- https://drive.google.com/file/d/144cOnM6fxfuBeP0V2JQshp8C0Zlk_0kH/view - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
LuckyCat
Internal MISP references
UUID 1785a4dd-4044-4405-91c2-efb722801867
which can be used as unique global reference for LuckyCat
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Mandrake
Internal MISP references
UUID 0f587654-7f70-43be-9f1f-95e3a2cc2014
which can be used as unique global reference for Mandrake
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Marcher
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Marcher.
Known Synonyms |
---|
ExoBot |
Internal MISP references
UUID f691663a-b360-4c0d-a4ee-e9203139c38e
which can be used as unique global reference for Marcher
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/apk.marcher - webarchive
- https://securelist.com/mobile-malware-evolution-2019/96280/ - webarchive
- https://www.zscaler.de/blogs/research/android-marcher-continuously-evolving-mobile-malware - webarchive
- https://www.clientsidedetection.com/exobot_v2_update___staying_ahead_of_the_competition.html - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
MasterFred
According to heimdal, MasterFred malware, this is designed as an Android trojan that makes use of false login overlays to target not only Netflix, Instagram, and Twitter users, but also bank customers. The hackers’ goal is to steal credit card information.
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular MasterFred.
Known Synonyms |
---|
Brox |
Internal MISP references
UUID 87131ea3-4c5e-42ba-a8e2-edd62a0bcd8d
which can be used as unique global reference for MasterFred
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
MazarBot
Internal MISP references
UUID 38cbdc29-a5af-46ae-ab82-baf3f6999826
which can be used as unique global reference for MazarBot
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Medusa (Android)
According to ThreatFabric, this is an Android banking trojan under active development as of July 2020. It is using TCP for C&C communication and targets Turkish banks.
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Medusa (Android).
Known Synonyms |
---|
Gorgona |
Internal MISP references
UUID f155e529-dbea-4e4d-9df3-518401191c82
which can be used as unique global reference for Medusa (Android)
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/apk.medusa - webarchive
- https://www.threatfabric.com/blogs/partners-in-crime-medusa-cabassous.html - webarchive
- https://www.cleafy.com/cleafy-labs/medusa-reborn-a-new-compact-variant-discovered - webarchive
- https://www.threatfabric.com/blogs/the-rage-of-android-banking-trojans.html - webarchive
- https://twitter.com/ThreatFabric/status/1285144962695340032 - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Meterpreter (Android)
Internal MISP references
UUID e1ae3e4e-5aaf-4ffe-ba2f-7871507f6d52
which can be used as unique global reference for Meterpreter (Android)
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/apk.meterpreter - webarchive
- https://www.trendmicro.com/en_us/research/20/l/sidewinder-leverages-south-asian-territorial-issues-for-spear-ph.html - webarchive
- https://medium.com/@cryptax/locating-the-trojan-inside-an-infected-covid-19-contact-tracing-app-21e23f90fbfe - webarchive
- https://medium.com/@cryptax/into-android-meterpreter-and-how-the-malware-launches-it-part-2-ef5aad2ebf12 - webarchive
- https://mp.weixin.qq.com/s/J_A12SOX0k5TOYFAegBv_w - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
MobileOrder
Check Point has identified samples of this spyware being distributed since 2015. No samples were found on Google Play, meaning they were likely through other channels like social engineering.
Internal MISP references
UUID ee19588f-9752-4516-85f4-de18acfc64b3
which can be used as unique global reference for MobileOrder
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Monokle
Monokle is a sophisticated mobile surveillanceware that possesses remote access trojan (RAT) functionality, advanced data exfiltration techniques as well as the ability to install an attacker-specified certificate to the trusted certificates on an infected device that would allow for man-in-the-middle (MITM) attacks. According to Lookout researchers, It is believed to be developed by Special Technology Center (STC), which is a Russian defense contractor sanctioned by the U.S. Government in connection to alleged interference in the 2016 US presidential elections.
Internal MISP references
UUID 739d6d22-b187-4754-9098-22625ea612cc
which can be used as unique global reference for Monokle
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
MoqHao
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular MoqHao.
Known Synonyms |
---|
Shaoye |
XLoader |
Internal MISP references
UUID 41a9408d-7020-4988-af2c-51baf4d20763
which can be used as unique global reference for MoqHao
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/apk.moqhao - webarchive
- https://www.xanhacks.xyz/p/moqhao-malware-analysis - webarchive
- https://blog.trendmicro.com/trendlabs-security-intelligence/a-look-into-the-connection-between-xloader-and-fakespy-and-their-possible-ties-with-the-yanbian-gang/ - webarchive
- https://securelist.com/roaming-mantis-dns-changer-in-malicious-mobile-app/108464/ - webarchive
- https://securelist.com/roaming-mantis-part-v/96250/ - webarchive
- https://www.trendmicro.com/en_us/research/18/d/xloader-android-spyware-and-banking-trojan-distributed-via-dns-spoofing.html - webarchive
- https://hitcon.org/2019/CMT/slide-files/d2_s1_r1.pdf - webarchive
- https://team-cymru.com/blog/2021/08/11/moqhao-part-1-5-high-level-trends-of-recent-campaigns-targeting-japan/ - webarchive
- https://www.kashifali.ca/2021/05/05/roaming-mantis-amplifies-smishing-campaign-with-os-specific-android-malware/ - webarchive
- https://cryptax.medium.com/a-native-packer-for-android-moqhao-6362a8412fe1 - webarchive
- https://medium.com/csis-techblog/the-roamingmantis-groups-expansion-to-european-apple-accounts-and-android-devices-e6381723c681 - webarchive
- https://team-cymru.com/blog/2022/04/07/moqhao-part-2-continued-european-expansion/ - webarchive
- https://jsac.jpcert.or.jp/archive/2020/pdf/JSAC2020_4_ogawa-niseki_en.pdf - webarchive
- https://team-cymru.com/blog/2021/01/20/moqhao-part-1-identifying-phishing-infrastructure/ - webarchive
- https://www.telekom.com/en/blog/group/article/moqhao-masters-new-tricks-1031484 - webarchive
- https://www.trendmicro.com/en_us/research/18/k/a-look-into-the-connection-between-xloader-and-fakespy-and-their-possible-ties-with-the-yanbian-gang.html - webarchive
- https://www.team-cymru.com/post/moqhao-part-3-recent-global-targeting-trends - webarchive
- https://blog.sekoia.io/ongoing-roaming-mantis-smishing-campaign-targeting-france/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
MOrder RAT
Internal MISP references
UUID f91f27ad-edcd-4e3d-824e-23f6acd81a7b
which can be used as unique global reference for MOrder RAT
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Mudwater
Internal MISP references
UUID 9a8a5dd0-c86e-40d1-bc94-51070447c907
which can be used as unique global reference for Mudwater
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
MysteryBot
MysteryBot is an Android banking Trojan with overlay capabilities with support for Android 7/8 but also provides other features such as key logging and ransomware functionality.
Internal MISP references
UUID 0a53ace4-98ae-442f-be64-b8e373948bde
which can be used as unique global reference for MysteryBot
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Nexus
Internal MISP references
UUID fe0b4e6e-268e-4c63-a095-bf1ddff95055
which can be used as unique global reference for Nexus
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
OmniRAT
Internal MISP references
UUID ec936d58-6607-4e33-aa97-0e587bbbdda5
which can be used as unique global reference for OmniRAT
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/apk.omnirat - webarchive
- https://securityintelligence.com/news/omnirat-takes-over-android-devices-through-social-engineering-tricks/ - webarchive
- https://github.com/threatland/TL-TROJAN/tree/master/TL.RAT/RAT.Android.OmniRAT - webarchive
- https://blog.avast.com/2015/11/05/droidjack-isnt-the-only-spying-software-out-there-avast-discovers-that-omnirat-is-currently-being-used-and-spread-by-criminals-to-gain-full-remote-co - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Oscorp
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Oscorp.
Known Synonyms |
---|
UBEL |
Internal MISP references
UUID 8d383260-102f-46da-8cc6-7659cbbd9452
which can be used as unique global reference for Oscorp
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
PackChat
Internal MISP references
UUID b0f56103-1771-4e01-9ed7-44149e39ce93
which can be used as unique global reference for PackChat
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
PhantomLance
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular PhantomLance.
Known Synonyms |
---|
PWNDROID1 |
Internal MISP references
UUID a73375a5-3384-4515-8538-b598d225586d
which can be used as unique global reference for PhantomLance
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/apk.phantomlance - webarchive
- https://securelist.com/it-threat-evolution-q2-2020/98230 - webarchive
- https://threatvector.cylance.com/en_us/home/mobile-malware-and-apt-espionage-prolific-pervasive-and-cross-platform.html - webarchive
- https://www.blackberry.com/us/en/pdfviewer?file=/content/dam/blackberry-com/asset/enterprise/pdf/direct/mobile-malware-report.pdf - webarchive
- https://securelist.com/apt-phantomlance/96772/ - webarchive
- https://securelist.com/apt-trends-report-q2-2020/97937/ - webarchive
- https://drive.google.com/file/d/1m0Qg8e1Len1My6ssDy6F0oQ7JdkJUkuu/view - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Phoenix
Internal MISP references
UUID b5d57344-0486-4580-a437-54c61cb0bf4d
which can be used as unique global reference for Phoenix
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
PhoneSpy
According to Zimperium, PhoneSpy is a spyware aimed at South Korean residents with Android devices.
Internal MISP references
UUID ff00bbb6-6856-4cf5-adde-d1cc536dd0e2
which can be used as unique global reference for PhoneSpy
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
PINEFLOWER
According to Mandiant, PINEFLOWER is an Android malware family capable of a wide range of backdoor functionality, including stealing system inform information, logging and recording phone calls, initiating audio recordings, reading SMS inboxes and sending SMS messages. The malware also has features to facilitate device location tracking, deleting, downloading, and uploading files, reading connectivity state, speed, and activity, and toggling Bluetooth, Wi-Fi, and mobile data settings.
Internal MISP references
UUID a17a7c5d-0a8f-42e7-b4c9-63c258267776
which can be used as unique global reference for PINEFLOWER
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
PixPirate
According to PCrisk, The PixPirate is a dangerous Android banking Trojan that has the capability to carry out ATS (Automatic Transfer System) attacks. This allows threat actors to automatically transfer funds through the Pix Instant Payment platform, which numerous Brazilian banks use.
In addition to launching ATS attacks, PixPirate can intercept and delete SMS messages, prevent the uninstallation process, and carry out malvertising attacks.
Internal MISP references
UUID cdf707bd-a8b0-4ee3-917d-a56b11f30206
which can be used as unique global reference for PixPirate
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
PixStealer
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular PixStealer.
Known Synonyms |
---|
BrazKing |
Internal MISP references
UUID 5d047596-eb67-4fed-b41d-65fa975150c5
which can be used as unique global reference for PixStealer
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/apk.pixstealer - webarchive
- https://research.checkpoint.com/2021/pixstealer-a-new-wave-of-android-banking-trojans-abusing-accessibility-services/ - webarchive
- https://securityintelligence.com/posts/brazking-android-malware-upgraded-targeting-brazilian-banks/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
PjobRAT
Internal MISP references
UUID 6fa6c769-2546-4a5c-a3c7-24dda4ab597d
which can be used as unique global reference for PjobRAT
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/apk.pjobrat - webarchive
- https://cybleinc.com/2021/06/22/android-application-disguised-as-dating-app-targets-indian-military-personnel/ - webarchive
- https://labs.k7computing.com/?p=22537 - webarchive
- https://mp.weixin.qq.com/s/VTHvmRTeu3dw8HFyusKLqQ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Podec
Internal MISP references
UUID 82f9c4c1-2619-4236-a701-776c6c781f45
which can be used as unique global reference for Podec
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
X-Agent (Android)
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular X-Agent (Android).
Known Synonyms |
---|
Popr-d30 |
Internal MISP references
UUID 0a7d9d22-a26d-4a2b-ab9b-b296176c3ecf
which can be used as unique global reference for X-Agent (Android)
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Fake Pornhub
Internal MISP references
UUID 3272a8d8-8323-4e98-b6ce-cb40789a3616
which can be used as unique global reference for Fake Pornhub
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Premier RAT
Internal MISP references
UUID 661471fe-2cb6-4b83-9deb-43225192a849
which can be used as unique global reference for Premier RAT
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Rafel RAT
Internal MISP references
UUID cdaa0a6d-3709-4e6f-8807-fff388baaba0
which can be used as unique global reference for Rafel RAT
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
RambleOn
Internal MISP references
UUID 41ab3c99-297c-465c-8375-3e9f7ce4b996
which can be used as unique global reference for RambleOn
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Rana
Internal MISP references
UUID 65a8e406-b535-4c0a-bc6d-d1bec3c55623
which can be used as unique global reference for Rana
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
RatMilad
RatMilad, a newly discovered Android spyware, has been stealing data from mobile devices in the Middle East. The malware is spread through links on social media and pretends to be applications for services like VPN and phone number spoofing. Unwary users download these trojan applications and grant access to malware.
Internal MISP references
UUID 542c3e5e-2124-4c36-af05-65893974d5ce
which can be used as unique global reference for RatMilad
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Raxir
Internal MISP references
UUID f5cabe73-b5d6-4503-8350-30a6d54c32ef
which can be used as unique global reference for Raxir
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
RedAlert2
RedAlert 2 is an new Android malware used by an attacker to gain access to login credentials of various e-banking apps. The malware works by overlaying a login screen with a fake display that sends the credentials to a C2 server. The malware also has the ability to block incoming calls from banks, to prevent the victim of being notified. As a distribution vector RedAlert 2 uses third-party app stores and imitates real Android apps like Viber, Whatsapp or fake Adobe Flash Player updates.
Internal MISP references
UUID e9aaab46-abb1-4390-b37b-d0457d05b28f
which can be used as unique global reference for RedAlert2
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/apk.redalert2 - webarchive
- https://www.threatfabric.com/blogs/new_android_trojan_targeting_over_60_banks_and_social_apps.html - webarchive
- https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/red-alert-2-0-android-trojan-spreads-via-third-party-app-stores - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
RemRAT
Internal MISP references
UUID 23809a2b-3c24-41c5-a310-2b8045539202
which can be used as unique global reference for RemRAT
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Retefe (Android)
The Android app using for Retefe is a SMS stealer, used to forward mTAN codes to the threat actor. Further is a bank logo added to the specific Android app to trick users into thinking this is a legitimate app. Moreover, if the victim is not a real victim, the link to download the APK is not the malicious APK, but the real 'Signal Private Messenger' tool, hence the victim's phone doesn't get infected.
Internal MISP references
UUID 22ef1e56-7778-41d1-9b2b-737aa5bf9777
which can be used as unique global reference for Retefe (Android)
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/apk.retefe - webarchive
- http://blog.angelalonso.es/2017/02/hunting-retefe-with-splunk-some24.html - webarchive
- http://blog.dornea.nu/2014/07/07/disect-android-apks-like-a-pro-static-code-analysis/ - webarchive
- http://blog.angelalonso.es/2015/10/reversing-c2c-http-emmental.html - webarchive
- http://maldr0id.blogspot.ch/2014/09/android-malware-based-on-sms-encryption.html - webarchive
- http://blog.angelalonso.es/2015/11/reversing-sms-c-protocol-of-emmental.html - webarchive
- https://www.govcert.admin.ch/blog/33/the-retefe-saga - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Revive
According to PCrisk, Revive is the name of a banking Trojan targeting Android users (customers of a specific Spanish bank). It steals sensitive information. Cybercriminals use Revive to take ownership of online accounts using stolen login credentials. This malware abuses Accessibility Services to perform malicious activities.
Internal MISP references
UUID 25669934-14bf-463f-bcae-c59c590c3bf8
which can be used as unique global reference for Revive
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Riltok
Internal MISP references
UUID d7b347f8-77a5-4197-b818-f3af504da2c1
which can be used as unique global reference for Riltok
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Roaming Mantis
Internal MISP references
UUID 31d2ce1f-44bf-4738-a41d-ddb43466cd82
which can be used as unique global reference for Roaming Mantis
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/apk.roaming_mantis - webarchive
- https://systemweakness.com/investigating-a-fake-mobile-payment-smishing-that-abuses-duck-dns-d07c72468ba8 - webarchive
- https://securelist.com/roaming-mantis-part-v/96250/ - webarchive
- https://hitcon.org/2019/CMT/slide-files/d2_s1_r1.pdf - webarchive
- https://securelist.com/roaming-mantis-uses-dns-hijacking-to-infect-android-smartphones/85178/ - webarchive
- https://securelist.com/roaming-mantis-dabbles-in-mining-and-phishing-multilingually/85607/ - webarchive
- https://www.kashifali.ca/2021/05/05/roaming-mantis-amplifies-smishing-campaign-with-os-specific-android-malware/ - webarchive
- https://systemweakness.com/a-strange-font-smishing-that-changes-behaviour-based-on-user-agent-and-abuses-duck-dns-1c1a45863ff7 - webarchive
- https://securelist.com/roaming-mantis-reaches-europe/105596/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Rogue
Internal MISP references
UUID 4b53480a-8006-4af7-8e4e-cc8727c62648
which can be used as unique global reference for Rogue
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Rootnik
Internal MISP references
UUID db3dcfd1-79d2-4c91-898f-5f2463d7c417
which can be used as unique global reference for Rootnik
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/apk.rootnik - webarchive
- https://blog.fortinet.com/2017/01/26/deep-analysis-of-android-rootnik-malware-using-advanced-anti-debug-and-anti-hook-part-ii-analysis-of-the-scope-of-java - webarchive
- https://blog.fortinet.com/2017/01/24/deep-analysis-of-android-rootnik-malware-using-advanced-anti-debug-and-anti-hook-part-i-debugging-in-the-scope-of-native-layer - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Sauron Locker
Internal MISP references
UUID a7c058cf-d482-42cf-9ea7-d5554287ea65
which can be used as unique global reference for Sauron Locker
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
SharkBot
SharkBot is a piece of malicious software targeting Android Operating Systems (OSes). It is designed to obtain and misuse financial data by redirecting and stealthily initiating money transfers. SharkBot is particularly active in Europe (United Kingdom, Italy, etc.), but its activity has also been detected in the United States.
Internal MISP references
UUID 7b20fdb1-5aee-4f17-a88e-bcd72c893f0a
which can be used as unique global reference for SharkBot
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/apk.sharkbot - webarchive
- https://muha2xmad.github.io/malware-analysis/sharkbot/ - webarchive
- https://research.nccgroup.com/2022/03/03/sharkbot-a-new-generation-android-banking-trojan-being-distributed-on-google-play-store/ - webarchive
- https://www.threatfabric.com/blogs/the-attack-of-the-droppers.html - webarchive
- https://services.google.com/fh/files/blogs/gcat_threathorizons_full_jul2023.pdf - webarchive
- https://research.checkpoint.com/2022/google-is-on-guard-sharks-shall-not-pass/ - webarchive
- https://blog.fox-it.com/2022/09/02/sharkbot-is-back-in-google-play/ - webarchive
- https://bin.re/blog/the-dgas-of-sharkbot/ - webarchive
- https://www.cleafy.com/cleafy-labs/sharkbot-a-new-generation-of-android-trojan-is-targeting-banks-in-europe - webarchive
- https://blog.fox-it.com/2022/03/03/sharkbot-a-new-generation-android-banking-trojan-being-distributed-on-google-play-store/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
SideWinder (Android)
SideWinder involved a fake VPN app for Android devices published on Google Play Store along with a custom tool that filters victims for better targeting.
Internal MISP references
UUID af929cac-e0c6-4a63-ac5a-02c4cbbab746
which can be used as unique global reference for SideWinder (Android)
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
SilkBean
Internal MISP references
UUID 00ab3d3b-dbbf-40de-b3d8-a3466704a1a7
which can be used as unique global reference for SilkBean
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Skygofree
Internal MISP references
UUID f5fded3c-8f45-471a-a372-d8be101e1b22
which can be used as unique global reference for Skygofree
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Slempo
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Slempo.
Known Synonyms |
---|
SlemBunk |
Internal MISP references
UUID d87e2574-7b9c-4ea7-98eb-88f3e139f6ff
which can be used as unique global reference for Slempo
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Slocker
Internal MISP references
UUID fe187c8a-25d4-4d30-bd43-efca18d527f0
which can be used as unique global reference for Slocker
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/apk.slocker - webarchive
- https://labs.bitdefender.com/2020/05/android-slocker-variant-uses-coronavirus-scare-to-take-android-hostage/ - webarchive
- https://blog.trendmicro.com/trendlabs-security-intelligence/slocker-mobile-ransomware-starts-mimicking-wannacry/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
SmsAgent
Internal MISP references
UUID ee42986c-e736-4092-a2f9-2931a02c688d
which can be used as unique global reference for SmsAgent
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
SMSspy
Internal MISP references
UUID 7a38c552-0e1a-4980-8d62-1aa38617efab
which can be used as unique global reference for SMSspy
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
SoumniBot
Internal MISP references
UUID ed53cdaf-0649-4ca5-adcd-592a46f79da8
which can be used as unique global reference for SoumniBot
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
S.O.V.A.
Internal MISP references
UUID 2aa95661-b63a-432e-8e5e-74ac93b42d57
which can be used as unique global reference for S.O.V.A.
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/apk.sova - webarchive
- https://muha2xmad.github.io/malware-analysis/sova/ - webarchive
- https://blog.cyble.com/2021/09/14/deep-dive-analysis-of-s-o-v-a-android-banking-trojan/ - webarchive
- https://liansecurity.com/#/main/news/RWt_ZocBrFZDfCElFqw_/detail - webarchive
- https://blog.cyble.com/2023/03/09/nexus-the-latest-android-banking-trojan-with-sova-connections - webarchive
- https://cryptax.medium.com/eyes-on-android-s-o-v-a-botnet-sample-fb5ed332d08 - webarchive
- https://www.cleafy.com/cleafy-labs/sova-malware-is-back-and-is-evolving-rapidly - webarchive
- https://www.threatfabric.com/blogs/sova-new-trojan-with-fowl-intentions.html - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
SpyBanker
Internal MISP references
UUID e186384b-8001-4cdd-b170-1548deb8bf04
which can be used as unique global reference for SpyBanker
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
SpyC23
Internal MISP references
UUID 8fb4910f-e645-4465-a202-a20835416c87
which can be used as unique global reference for SpyC23
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
SpyMax
SpyMax is a popular Android surveillance tool. Its predecessor, SpyNote, was one of the most widely used spyware frameworks.
Internal MISP references
UUID e1dfb554-4c17-4d4c-ac48-604c48d8ab0b
which can be used as unique global reference for SpyMax
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/apk.spymax - webarchive
- https://www.threatfabric.com/blogs/spynote-rat-targeting-financial-institutions - webarchive
- https://www.zscaler.com/blogs/research/android-spyware-targeting-tanzania-premier-league - webarchive
- https://twitter.com/malwrhunterteam/status/1250412485808717826 - webarchive
- https://www.stratosphereips.org/blog/2020/11/10/android-mischief-rats-dataset - webarchive
- https://www.group-ib.com/blog/craxs-rat-malware/ - webarchive
- https://www.threatfabric.com/blogs/spynote-rat-targeting-financial-institutions.html - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
SpyNote
The malware has been released on github at https://github.com/EVLF/Cypher-Rat-Source-Code
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular SpyNote.
Known Synonyms |
---|
CypherRat |
Internal MISP references
UUID 31592c69-d540-4617-8253-71ae0c45526c
which can be used as unique global reference for SpyNote
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/apk.spynote - webarchive
- https://www.fortinet.com/blog/threat-research/android-spynote-moves-to-crypto-currencies - webarchive
- https://docs.google.com/document/d/1oYX3uN6KxIX_StzTH0s0yFNNoHDnV8VgmVqU5WoeErc/edit#heading=h.hcd1wvpsrgfr - webarchive
- https://www.civilsphereproject.org/blog/2021/9/21/capturing-and-detecting-androidtester-remote-access-trojan-with-the-emergency-vpn - webarchive
- https://hunt.io/blog/caught-in-the-act-uncovering-spynote-in-unexpected-places - webarchive
- https://mp.weixin.qq.com/s/mstwBMkS0G3Et4GOji2mwA - webarchive
- https://hunt.io/blog/inside-a-cybercriminal-s-server-ddos-tools-spyware-apks-and-phishing-pages - webarchive
- https://www.bleepingcomputer.com/news/security/spynote-android-malware-infections-surge-after-source-code-leak/ - webarchive
- https://about.fb.com/news/2021/04/taking-action-against-hackers-in-palestine/ - webarchive
- https://labs.k7computing.com/index.php/spynote-an-android-snooper/ - webarchive
- https://www.threatfabric.com/blogs/spynote-rat-targeting-financial-institutions.html - webarchive
- https://cryptax.medium.com/android-spynote-bypasses-restricted-settings-breaks-many-re-tools-8791b3e6bf38 - webarchive
- https://intel471.com/blog/china-cybercrime-undergrond-deepmix-tea-horse-road-great-firewall/ - webarchive
- https://ti.qianxin.com/blog/articles/Blade-hawk-The-activities-of-targeted-the-Middle-East-and-West-Asia-are-exposed/ - webarchive
- https://mp.weixin.qq.com/s/J_A12SOX0k5TOYFAegBv_w - webarchive
- https://www.group-ib.com/blog/craxs-rat-malware/ - webarchive
- https://www.cleafy.com/cleafy-labs/spynote-continues-to-attack-financial-institutions - webarchive
- https://bulldogjob.pl/articles/1200-an-in-depth-analysis-of-spynote-remote-access-trojan - webarchive
- https://labs.k7computing.com/index.php/spynote-targets-irctc-users/ - webarchive
- https://www.threatfabric.com/blogs/spynote-rat-targeting-financial-institutions - webarchive
- https://www.volexity.com/blog/2020/03/31/storm-cloud-unleashed-tibetan-community-focus-of-highly-targeted-fake-flash-campaign/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
StealthAgent
Internal MISP references
UUID 0777cb30-534f-44bb-a7af-906a422bd624
which can be used as unique global reference for StealthAgent
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Stealth Mango
Internal MISP references
UUID 7d480f11-3de8-463d-8a19-54685c8b9e0f
which can be used as unique global reference for Stealth Mango
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Svpeng
Internal MISP references
UUID d99c0a47-9d61-4d92-86ec-86a87b060d76
which can be used as unique global reference for Svpeng
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Switcher
Internal MISP references
UUID e3e90666-bc19-4741-aca8-1e4cbc2f4c9e
which can be used as unique global reference for Switcher
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
TalentRAT
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular TalentRAT.
Known Synonyms |
---|
Assassin RAT |
Internal MISP references
UUID 46151a0d-aa0a-466c-9fff-c2c3474f572e
which can be used as unique global reference for TalentRAT
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
TangleBot
Internal MISP references
UUID 1e37d712-df02-48aa-82fc-28fa80c92c2b
which can be used as unique global reference for TangleBot
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
TeleRAT
Internal MISP references
UUID e1600d04-d2f7-4862-8bbc-0f038ea683ea
which can be used as unique global reference for TeleRAT
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
TemptingCedar Spyware
Internal MISP references
UUID 982c3554-1df2-4062-8f32-f311940ad9ff
which can be used as unique global reference for TemptingCedar Spyware
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
ThiefBot
Internal MISP references
UUID 5863d2eb-920d-4263-8c4b-7a16d410ff89
which can be used as unique global reference for ThiefBot
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
TianySpy
According to Trend Micro, this malware appears to have been designed to steal credentials associated with membership websites of major Japanese telecommunication services.
Internal MISP references
UUID 8260dda5-f608-48f2-9341-28dbc5a8e895
which can be used as unique global reference for TianySpy
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
TinyZ
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular TinyZ.
Known Synonyms |
---|
Catelites Android Bot |
MarsElite Android Bot |
Internal MISP references
UUID 93b27a50-f9b7-4ab6-bb9f-70a4b914eec3
which can be used as unique global reference for TinyZ
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Titan
Internal MISP references
UUID 7d418da3-d9d2-4005-8cc7-7677d1b11327
which can be used as unique global reference for Titan
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
ToxicPanda
Internal MISP references
UUID 7ac4865d-dc9d-468e-a462-67dfc63d118b
which can be used as unique global reference for ToxicPanda
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Triada
Internal MISP references
UUID fa5fdfd2-8142-43f5-9b48-d1033b5398c8
which can be used as unique global reference for Triada
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/apk.triada - webarchive
- https://arstechnica.com/information-technology/2019/06/google-confirms-2017-supply-chain-attack-that-sneaked-backdoor-on-android-devices/ - webarchive
- http://contagiominidump.blogspot.de/2016/07/android-triada-modular-trojan.html - webarchive
- https://securelist.com/attack-on-zygote-a-new-twist-in-the-evolution-of-mobile-threats/74032/ - webarchive
- https://securelist.com/everyone-sees-not-what-they-want-to-see/74997/ - webarchive
- https://www.nowsecure.com/blog/2016/11/21/android-malware-analysis-radare-triada-trojan/ - webarchive
- https://securelist.com/triada-trojan-in-whatsapp-mod/103679/ - webarchive
- https://securelist.com/apkpure-android-app-store-infected/101845/ - webarchive
- https://securelist.com/mobile-malware-evolution-2019/96280/ - webarchive
- https://blog.checkpoint.com/2016/06/17/in-the-wild-mobile-malware-implements-new-features/ - webarchive
- https://security.googleblog.com/2019/06/pha-family-highlights-triada.html - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
TrickMo
TrickMo is an advanced banking trojan for Android. Starting out as a companion malware to TrickBot in 2020, it first became a standalone banking trojan by addition of overlay attacks in 2021 and was later (2024) upgraded with remote control capabilities for on-device fraud. The continued development and progressively improved obfuscation suggests an active Threat Actor.
Internal MISP references
UUID cff89ce1-a133-48a6-b8bd-e4f97cf23d6a
which can be used as unique global reference for TrickMo
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/apk.trickmo - webarchive
- https://www.cleafy.com/cleafy-labs/a-new-trickmo-saga-from-banking-trojan-to-victims-data-leak - webarchive
- https://www.zimperium.com/blog/expanding-the-investigation-deep-dive-into-latest-trickmo-samples/ - webarchive
- https://securityintelligence.com/posts/trickbot-pushing-a-2fa-bypass-app-to-bank-customers-in-germany/ - webarchive
- https://cyble.com/blog/trickmos-return-banking-trojan-resurgence-with-new-features/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Triout
Bitdefender described Triout as a Android spyware, which appears to act as a framework for building extensive surveillance capabilities into seemingly benign applications. Found bundled with a repackaged app, the spyware’s surveillance capabilities involve hiding its presence on the device, recording phone calls, logging incoming text messages, recoding videos, taking pictures and collecting GPS coordinates, then broadcasting all of that to an attacker-controlled C&C (command and control) server.
Internal MISP references
UUID bd9ce51c-53f9-411b-b46a-aba036c433b1
which can be used as unique global reference for Triout
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
UltimaSMS
Internal MISP references
UUID 65476d5f-321f-4385-867a-383094cadb58
which can be used as unique global reference for UltimaSMS
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Unidentified APK 001
Internal MISP references
UUID bbd5a32e-a080-4f16-98ea-ad8863507aa6
which can be used as unique global reference for Unidentified APK 001
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Unidentified APK 002
Internal MISP references
UUID afb6a7cc-4185-4f19-8ad4-45dcbb76e544
which can be used as unique global reference for Unidentified APK 002
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Unidentified APK 004
According to Check Point Research, this is a RAT that is disguised as a set of dating apps like "GrixyApp", "ZatuApp", "Catch&See", including dedicated websites to conceal their malicious purpose.
Internal MISP references
UUID 55626b63-4b9a-468e-92ae-4b09b303d0ed
which can be used as unique global reference for Unidentified APK 004
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Unidentified APK 005
Internal MISP references
UUID 5413ca94-1385-40c0-8eb2-1fc3aff87fb1
which can be used as unique global reference for Unidentified APK 005
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Unidentified APK 006
Information stealer posing as a fake banking app, targeting Korean users.
Internal MISP references
UUID 2263198d-af38-4e38-a7a8-4435d29d88e8
which can be used as unique global reference for Unidentified APK 006
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/apk.unidentified_006 - webarchive
- https://blog.cyble.com/2021/09/17/sophisticated-spyware-posing-as-a-banking-application-to-target-korean-users/ - webarchive
- https://twitter.com/ReBensk/status/1438027183490940931 - webarchive
- https://medium.com/@ThreatMiner/android-trojan-targeting-korean-demographic-using-github-for-c2-8219fc39f749 - webarchive
- https://twitter.com/MsftSecIntel/status/1441524497924833282?s=20 - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Unidentified 007 (ARMAAN RAT)
According to Cyble, this is an Android application that pretends to be the legitimate application for the Army Mobile Aadhaar App Network (ARMAAN), intended to be used by Indian army personnel. The application was customized to include RAT functionality.
Internal MISP references
UUID 75c641c4-17df-43c4-9773-c27464c5d2ff
which can be used as unique global reference for Unidentified 007 (ARMAAN RAT)
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Unidentified APK 008
Android malware distributed through fake shopping websites targeting Malaysian users, targeting banking information.
Internal MISP references
UUID 2ffddca0-841c-4eb6-9983-ff38abb5d6d6
which can be used as unique global reference for Unidentified APK 008
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Unidentified APK 009 (Chrome Recon)
According to Google, a Chrome reconnaissance payload
Internal MISP references
UUID 6d3bcabe-6b3a-49c1-b1a9-2239ce06deae
which can be used as unique global reference for Unidentified APK 009 (Chrome Recon)
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
VajraSpy
Internal MISP references
UUID c328b30f-e076-47dc-8c93-4d20f62c72ab
which can be used as unique global reference for VajraSpy
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
vamp
Related to the micropsia windows malware and also sometimes named micropsia.
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular vamp.
Known Synonyms |
---|
android.micropsia |
Internal MISP references
UUID 1ad5b462-1b0d-4c2f-901d-ead6c9f227bc
which can be used as unique global reference for vamp
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
VINETHORN
According to Mandiant, VINETHORN is an Android malware family capable of a wide range of backdoor functionality. It can steal system information, read SMS inboxes, send SMS messages, access contact lists and call histories, record audio and video, and track device location via GPS.
Internal MISP references
UUID 6da6dfb6-2c50-465c-9394-26695d72e8c7
which can be used as unique global reference for VINETHORN
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Viper RAT
Internal MISP references
UUID 3482f5fe-f129-4c77-ae98-76e25f6086b9
which can be used as unique global reference for Viper RAT
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/apk.viper_rat - webarchive
- https://securelist.com/blog/incidents/77562/breaking-the-weakest-link-of-the-strongest-chain/ - webarchive
- https://about.fb.com/wp-content/uploads/2021/04/Technical-threat-report-Arid-Viper-April-2021.pdf - webarchive
- https://blog.lookout.com/blog/2017/02/16/viperrat-mobile-apt/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Vultur
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Vultur.
Known Synonyms |
---|
Vulture |
Internal MISP references
UUID 49b1c344-ce13-48bf-9839-909ba57649c4
which can be used as unique global reference for Vultur
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/apk.vultur - webarchive
- https://www.cleafy.com/cleafy-labs/the-android-malwares-journey-from-google-play-to-banking-fraud - webarchive
- https://www.threatfabric.com/blogs/the-attack-of-the-droppers.html - webarchive
- https://blog.fox-it.com/2024/03/28/android-malware-vultur-expands-its-wingspan - webarchive
- https://twitter.com/icebre4ker/status/1485651238175846400 - webarchive
- https://www.threatfabric.com/blogs/vultur-v-for-vnc.html - webarchive
- https://embeeresearch.io/infrastructure-tracking-locating-vultur-domains-with-passive-dns/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
WireX
Internal MISP references
UUID 77f2254c-9886-4eed-a7c3-bbcef4a97d46
which can be used as unique global reference for WireX
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/apk.wirex - webarchive
- https://therecord.media/turkish-national-charged-for-ddos-attacks-with-the-wirex-botnet/ - webarchive
- https://www.flashpoint-intel.com/blog/wirex-botnet-industry-collaboration/ - webarchive
- https://krebsonsecurity.com/2017/08/tech-firms-team-up-to-take-down-wirex-android-ddos-botnet/ - webarchive
- https://www.justice.gov/usao-ndil/pr/federal-indictment-chicago-charges-turkish-national-directing-cyber-attack - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
WolfRAT
Internal MISP references
UUID 994c7bb3-ba40-41bb-89b3-f05996924b10
which can be used as unique global reference for WolfRAT
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Wroba
According to Avira, this is a banking trojan targeting Japan.
Internal MISP references
UUID 40a5d526-ef9f-4ddf-a326-6f33dceeeebc
which can be used as unique global reference for Wroba
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
WyrmSpy
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular WyrmSpy.
Known Synonyms |
---|
AndroidControl |
Internal MISP references
UUID 77f81373-bb3a-449d-82ff-b28fe31acef6
which can be used as unique global reference for WyrmSpy
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/apk.wyrmspy - webarchive
- https://cryptax.medium.com/organizing-malware-analysis-with-colander-example-on-android-wyrmspy-1f3ec30ae33b - webarchive
- https://www.threatfabric.com/blogs/lightspy-mapt-mobile-payment-system-attack - webarchive
- https://www.lookout.com/threat-intelligence/article/wyrmspy-dragonegg-surveillanceware-apt41 - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Xbot
Internal MISP references
UUID 4cfa42a3-71d9-43e2-bf23-daa79f326387
which can be used as unique global reference for Xbot
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/apk.xbot - webarchive
- https://researchcenter.paloaltonetworks.com/2016/02/new-android-trojan-xbot-phishes-credit-cards-and-bank-accounts-encrypts-devices-for-ransom/ - webarchive
- https://blog.avast.com/2015/02/17/angry-android-hacker-hides-xbot-malware-in-popular-application-icons/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Xenomorph
Xenomorph is a Android Banking RAT developed by the Hadoken.Security actor.
Internal MISP references
UUID d202e42d-2c35-4c1c-90f1-644a8cae38f1
which can be used as unique global reference for Xenomorph
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/apk.xenomorph - webarchive
- https://www.threatfabric.com/blogs/xenomorph-a-newly-hatched-banking-trojan.html - webarchive
- https://www.threatfabric.com/blogs/bugdrop-new-dropper-bypassing-google-security-measures.html - webarchive
- https://www.threatfabric.com/blogs/xenomorph-v3-new-variant-with-ats.html - webarchive
- https://cryptax.medium.com/unpacking-a-jsonpacker-packed-sample-4038e12119f5 - webarchive
- https://www.zscaler.com/blogs/security-research/rise-banking-trojan-dropper-google-play-0 - webarchive
- https://www.threatfabric.com/blogs/zombinder-ermac-and-desktop-stealers.html - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
xHelper
Internal MISP references
UUID f54dec1f-bec6-4f4a-a909-690d65e0f14b
which can be used as unique global reference for xHelper
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
XploitSPY
Internal MISP references
UUID 57600f52-b55f-49c7-9c0c-de10b2d23370
which can be used as unique global reference for XploitSPY
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
XRat
Internal MISP references
UUID a8f167a8-30b9-4953-8eb6-247f0d046d32
which can be used as unique global reference for XRat
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
YellYouth
Internal MISP references
UUID a2dad59d-2355-415c-b4d6-62236d3de4c7
which can be used as unique global reference for YellYouth
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Zanubis
According to cyware, Zanubis malware pretends to be a malicious PDF application. The threat actor uses it as a key to decrypt responses received from the C2 server.
Internal MISP references
UUID cebf13e5-dbfc-49d6-8715-e3b7687d386f
which can be used as unique global reference for Zanubis
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Zen
Internal MISP references
UUID 46d6d102-fc38-46f7-afdc-689cafe13de5
which can be used as unique global reference for Zen
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
ZooPark
Internal MISP references
UUID b1fc66de-fda7-4f0c-af00-751d334444b3
which can be used as unique global reference for ZooPark
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/apk.zoopark - webarchive
- https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2018/05/03114450/ZooPark_for_public_final_edit.pdf - webarchive
- https://securelist.com/whos-who-in-the-zoo/85394/ - webarchive
- https://securelist.com/whos-who-in-the-zoo/85394 - webarchive
- https://securelist.com/apt-trends-report-q2-2019/91897/ - webarchive
- https://www.secureworks.com/research/threat-profiles/cobalt-juno - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Ztorg
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Ztorg.
Known Synonyms |
---|
Qysly |
Internal MISP references
UUID 9fbf97c0-d87a-47b0-a511-0147a58b5202
which can be used as unique global reference for Ztorg
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/apk.ztorg - webarchive
- http://blog.fortinet.com/2017/03/08/teardown-of-android-ztorg-part-2 - webarchive
- https://securelist.com/ztorg-from-rooting-to-sms/78775/ - webarchive
- https://blog.fortinet.com/2017/03/15/teardown-of-a-recent-variant-of-android-ztorg-part-1 - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Nightrunner
WebShell.
Internal MISP references
UUID b0206aac-30ff-41ce-b7d4-1b94ab15e3b1
which can be used as unique global reference for Nightrunner
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Tunna
WebShell.
Internal MISP references
UUID b057f462-dc32-4f7b-95e0-98a20a48f2b2
which can be used as unique global reference for Tunna
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
TwoFace
According to Unit42, TwoFace is a two-staged (loader+payload) webshell, written in C# and meant to run on webservers with ASP.NET. The author of the initial loader webshell included legitimate and expected content that will be displayed if a visitor accesses the shell in a browser, likely to remain undetected. The code in the loader webshell includes obfuscated variable names and the embedded payload is encoded and encrypted. To interact with the loader webshell, the threat actor uses HTTP POST requests to the compromised server.
The secondary webshell, which we call the payload, is embedded within the loader in encrypted form and contains additional functionality that we will discuss in further detail. When the threat actor wants to interact with the remote server, they provide data that the loader will use to modify a decryption key embedded within the loader that will be in turn used to decrypt the embedded TwoFace payload. Commands supported by the payload are execution of programs, up-, download and deletion of files and capability to manipulate MAC timestamps.
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular TwoFace.
Known Synonyms |
---|
HighShell |
HyperShell |
Minion |
SEASHARPEE |
Internal MISP references
UUID a98a04e5-1f86-44b8-91ff-dbe1534782ba
which can be used as unique global reference for TwoFace
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/asp.twoface - webarchive
- https://www.youtube.com/watch?time_continue=1333&v=1CGAmjAV8nI - webarchive
- https://www.ptsecurity.com/ww-en/analytics/pt-esc-threat-intelligence/incident-response-polar-ransomware-apt27/ - webarchive
- https://unit42.paloaltonetworks.com/unit42-oilrig-performs-tests-twoface-webshell/ - webarchive
- https://go.recordedfuture.com/hubfs/reports/cta-2020-0312.pdf - webarchive
- https://drive.google.com/file/d/1oA4YSwXLxEF-EXJcrM76Bc4_7ZfBGYE4/view - webarchive
- https://unit42.paloaltonetworks.com/atoms/evasive-serpens/ - webarchive
- https://unit42.paloaltonetworks.com/unit42-twoface-webshell-persistent-access-point-lateral-movement/ - webarchive
- https://www.sans.org/cyber-security-summit/archives/file/summit-archive-1536345486.pdf - webarchive
- https://www.recordedfuture.com/full-spectrum-detections-five-popular-web-shells/ - webarchive
- https://cyware.com/blog/apt34-the-helix-kitten-cybercriminal-group-loves-to-meow-middle-eastern-and-international-organizations-48ae - webarchive
- https://www.cyber.gov.au/sites/default/files/2020-06/ACSC-Advisory-2020-008-Copy-Paste-Compromises.pdf - webarchive
- https://www.secureworks.com/research/threat-profiles/cobalt-gypsy - webarchive
- https://www.zdnet.com/article/source-code-of-iranian-cyber-espionage-tools-leaked-on-telegram/ - webarchive
- https://web.archive.org/web/20200307113010/https://www.sans.org/cyber-security-summit/archives/file/summit-archive-1574947864.pdf - webarchive
- https://www.youtube.com/watch?v=GjquFKa4afU - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Unidentified ASP 001 (Webshell)
Internal MISP references
UUID d4318f40-a39a-4ce0-8d3c-246d9923d222
which can be used as unique global reference for Unidentified ASP 001 (Webshell)
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Abcbot
Abcbot is a modular Go-based botnet and malware that propagates via exploits and brute force attempts. The botnet was observed launching DDoS attacks, perform internet scans, and serve web pages. It is probably linked to Xanthe-based clipjacking campaign.
Internal MISP references
UUID 8d17175b-4e9f-43a9-851d-898bb6696984
which can be used as unique global reference for Abcbot
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.abcbot - webarchive
- https://www.lacework.com/blog/abc-botnet-attacks-on-the-rise/ - webarchive
- https://www.cadosecurity.com/the-continued-evolution-of-abcbot/ - webarchive
- https://www.cadosecurity.com/abcbot-an-evolution-of-xanthe/ - webarchive
- https://blog.netlab.360.com/abcbot_an_evolving_botnet_en/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Abyss Locker
Family based on HelloKitty Ransomware. Encryption algorithm changed from AES to ChaCha. Sample seems to be unpacked.
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Abyss Locker.
Known Synonyms |
---|
elf.hellokitty |
Internal MISP references
UUID 302a96b1-73cb-4f70-a329-e68debd87bf8
which can be used as unique global reference for Abyss Locker
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
ACBackdoor (ELF)
A Linux backdoor that was apparently ported to Windows. This entry represents the Linux version. This version appears to have been written first and the Windows version was ported later, without full functionality. The Linux version offers persistence as well as some process manipulation techniques, though both versions apparently offer the ability to access the command line and execute programs as well as self-update.
Internal MISP references
UUID cd2d7040-edc4-4985-b708-b206b08cc1fe
which can be used as unique global reference for ACBackdoor (ELF)
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.acbackdoor - webarchive
- https://www.vmware.com/content/dam/digitalmarketing/vmware/en/pdf/docs/vmw-exposing-malware-in-linux-based-multi-cloud-environments.pdf - webarchive
- https://medium.com/@Ilandu/portdoor-malware-afc9d0796cba - webarchive
- https://www.bleepingcomputer.com/news/security/linux-windows-users-targeted-with-new-acbackdoor-malware/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
AcidPour
Internal MISP references
UUID 11981e96-be46-4ce9-8085-af7224591951
which can be used as unique global reference for AcidPour
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
AcidRain
A MIPS ELF binary with wiper functionality used against Viasat KA-SAT modems.
Internal MISP references
UUID 6108aa3d-ea6e-47fd-9344-d333b07f5a56
which can be used as unique global reference for AcidRain
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.acidrain - webarchive
- https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/overview-of-the-cyber-weapons-used-in-the-ukraine-russia-war - webarchive
- https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/overview-of-the-cyber-weapons-used-in-the-ukraine-russia-war/ - webarchive
- https://www.splunk.com/en_us/blog/security/threat-update-acidrain-wiper.html - webarchive
- https://cybersecurity.att.com/blogs/labs-research/analysis-on-recent-wiper-attacks-examples-and-how-they-wiper-malware-works - webarchive
- https://www.trellix.com/blogs/research/pouring-acid-rain/ - webarchive
- https://www.youtube.com/watch?v=mrTdSdMMgnk - webarchive
- https://www.fortinet.com/blog/threat-research/the-increasing-wiper-malware-threat - webarchive
- https://www.bleepingcomputer.com/news/security/viasat-confirms-satellite-modems-were-wiped-with-acidrain-malware/ - webarchive
- https://www.sentinelone.com/labs/acidrain-a-modem-wiper-rains-down-on-europe/ - webarchive
- https://www.splunk.com/en_us/blog/security/strt-ta03-cpe-destructive-software.html - webarchive
- https://www.reversemode.com/2022/03/viasat-incident-from-speculation-to.html - webarchive
- https://cybersecuritynews.com/acidrain-wiper-malware/ - webarchive
- https://www.techtimes.com/articles/273755/20220331/viasat-hit-russia-s-wiper-malware-called-acidrain-affecting-european.htm - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
AgeLocker
Internal MISP references
UUID 5d04aac3-fdf5-4922-9976-3a5a75e96e1a
which can be used as unique global reference for AgeLocker
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.age_locker - webarchive
- https://therecord.media/qnap-warns-of-agelocker-ransomware-attacks-against-nas-devices/ - webarchive
- https://twitter.com/IntezerLabs/status/1326880812344676352 - webarchive
- https://www.intezer.com/blog/cloud-security/top-linux-cloud-threats-of-2020/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
AirDropBot
AirDropBot is used to create a DDoS botnet. It spreads as a worm, currently targeting Linksys routers. Backdoor and other bot functionality is present in this family. Development seems to be ongoing.
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular AirDropBot.
Known Synonyms |
---|
CloudBot |
Internal MISP references
UUID e91fcb82-e788-44cb-be5d-73b9601b9533
which can be used as unique global reference for AirDropBot
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Aisuru
Honeypot-aware variant of Mirai.
Internal MISP references
UUID e288425b-40f0-441e-977f-5f1264ed61b6
which can be used as unique global reference for Aisuru
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Akira (ELF)
Ransomware
Internal MISP references
UUID 365081b9-f60d-4484-befa-d4fc9d0f55d7
which can be used as unique global reference for Akira (ELF)
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.akira - webarchive
- https://www.microsoft.com/en-us/security/blog/2023/10/11/automatic-disruption-of-human-operated-attacks-through-containment-of-compromised-user-accounts/ - webarchive
- https://arcticwolf.com/resources/blog/arctic-wolf-labs-observes-increased-fog-and-akira-ransomware-activity-linked-to-sonicwall-ssl-vpn/ - webarchive
- https://www.trellix.com/en-us/about/newsroom/stories/research/akira-ransomware.html - webarchive
- https://www.loginsoft.com/post/akira-ransomware-the-evolution-of-a-major-threat - webarchive
- https://labs.k7computing.com/index.php/akiras-play-with-linux/ - webarchive
- https://medium.com/@DCSO_CyTec/unransomware-from-zero-to-full-recovery-in-a-blink-8a47dd031df3 - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
AnchorDNS
Backdoor deployed by the TrickBot actors. It uses DNS as the command and control channel as well as for exfiltration of data.
Internal MISP references
UUID b88dc3ec-d94c-4e6e-a846-5d07130df550
which can be used as unique global reference for AnchorDNS
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.anchor_dns - webarchive
- https://www.microsoft.com/security/blog/2022/05/09/ransomware-as-a-service-understanding-the-cybercrime-gig-economy-and-how-to-protect-yourself - webarchive
- https://securityintelligence.com/posts/new-malware-trickbot-anchordns-backdoor-upgrades-anchormail/ - webarchive
- https://mal-eats.net/2021/05/10/campo_new_attack_campaign_targeting_japan/ - webarchive
- https://mal-eats.net/en/2021/05/11/campo_new_attack_campaign_targeting_japan/ - webarchive
- https://medium.com/stage-2-security/anchor-dns-malware-family-goes-cross-platform-d807ba13ca30 - webarchive
- https://us-cert.cisa.gov/sites/default/files/publications/AA20-302A_Ransomware%20_Activity_Targeting_the_Healthcare_and_Public_Health_Sector.pdf - webarchive
- https://hello.global.ntt/en-us/insights/blog/trickbot-variant-communicating-over-dns - webarchive
- https://cyware.com/news/trickbots-anchordns-is-now-upgraded-to-anchormail-a21f5490/ - webarchive
- https://www.domaintools.com/resources/blog/finding-anchordns-c2s-with-iris-investigate - webarchive
- https://www.netscout.com/blog/asert/dropping-anchor - webarchive
- https://www.intezer.com/blog/cloud-security/top-linux-cloud-threats-of-2020/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
ANGRYREBEL
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular ANGRYREBEL.
Known Synonyms |
---|
Ghost RAT |
Internal MISP references
UUID 6cb47609-b03e-43d9-a4c7-8342f1011f3b
which can be used as unique global reference for ANGRYREBEL
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
AVrecon
AVrecon is a Linux-based Remote Access Trojan (RAT) targeting small-office/home-office (SOHO) routers and other ARM-embedded devices. The malware is distributed via exploitation of unpatched vulnerabilities or common misconfiguration of the targeted devices. Once deployed, AVreckon will collect some information about the infected device, open a session to pre-configured C&C server, and spawn a remote shell for command execution. It might also download additional arbitrary files and run them. The malware has recently been used in campaigns aimed at ad-fraud activities, password spraying and data exfiltration.
Internal MISP references
UUID 1b218432-dd5c-4593-8f37-e202f9418fff
which can be used as unique global reference for AVrecon
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.avrecon - webarchive
- https://krebsonsecurity.com/2023/07/who-and-what-is-behind-the-malware-proxy-service-socksescort/ - webarchive
- https://blog.lumen.com/routers-from-the-underground-exposing-avrecon/ - webarchive
- https://spur.us/2023/07/christmas-in-july-a-finely-wrapped-proxy-service/ - webarchive
- https://twitter.com/BlackLotusLabs/status/1684290046235484160 - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
azazel
Azazel is a Linux user-mode rootkit based off of a technique from the Jynx rootkit (LD_PRELOAD technique). Azazel is purportedly more robust than Jynx and has many more anti-analysis features
Internal MISP references
UUID 37374572-3346-4c00-abc9-9f6883c8866e
which can be used as unique global reference for azazel
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
B1txor20
B1txor20 is a malware that was discovered by 360 Netlab along others exploiting Log4J. the name is derived from using the file name "b1t", the XOR encrpytion algorithm, and the RC4 algorithm key length of 20 bytes. According to 360 Netlab this Backdoor for Linux platform uses DNS Tunnel to build a C2 communication channel. They also had the assumption that the malware is still in development, because of some bugs and not fully implemented features.
Internal MISP references
UUID 05e6d9ff-93a1-429b-b856-794d9ded75df
which can be used as unique global reference for B1txor20
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Babuk (ELF)
ESX and NAS modules for Babuk ransomware.
Internal MISP references
UUID 26b4d805-890b-4767-9d9f-a08adeee1c96
which can be used as unique global reference for Babuk (ELF)
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.babuk - webarchive
- https://medium.com/s2wlab/blackmatter-x-babuk-using-the-same-web-server-for-sharing-leaked-files-d01c20a74751 - webarchive
- https://www.mcafee.com/blogs/enterprise/mcafee-enterprise-atr/how-groove-gang-is-shaking-up-the-ransomware-as-a-service-market-to-empower-affiliates/ - webarchive
- https://www.crowdstrike.com/blog/big-game-hunting-on-the-rise-again-according-to-ecrime-index/ - webarchive
- https://marcoramilli.com/2021/07/05/babuk-ransomware-the-builder/ - webarchive
- https://www.crowdstrike.com/blog/hypervisor-jackpotting-ecrime-actors-increase-targeting-of-esxi-servers/ - webarchive
- https://krebsonsecurity.com/2023/05/russian-hacker-wazawaka-indicted-for-ransomware/ - webarchive
- https://blogs.vmware.com/security/2022/09/esxi-targeting-ransomware-the-threats-that-are-after-your-virtual-machines-part-1.html - webarchive
- https://medium.com/s2wlab/grooves-thoughts-on-blackmatter-babuk-and-interruption-in-the-supply-of-cheese-in-the-b5328bc764f2 - webarchive
- https://www.advintel.io/post/groove-vs-babuk-groove-ransom-manifesto-ramp-underground-platform-secret-inner-workings - webarchive
- https://raw.githubusercontent.com/antonioCoco/infosec-talks/main/InsomniHack_2022_Ransomware_Encryption_Internals.pdf - webarchive
- https://symantec.broadcom.com/hubfs/The_Ransomware_Threat_September_2021.pdf - webarchive
- https://medium.com/s2wlab/groove-x-ramp-the-relation-between-groove-babuk-ramp-and-blackmatter-f75644f8f92d - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Backdoorit
According to Avast Decoded, Backdoorit is a multiplatform RAT written in Go programming language and supporting both Windows and Linux/Unix operating systems. In many places in the code it is also referred to as backd00rit.
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Backdoorit.
Known Synonyms |
---|
backd00rit |
Internal MISP references
UUID 4a4bc444-9e93-47a6-a572-0e13f743d875
which can be used as unique global reference for Backdoorit
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Irc16
Internal MISP references
UUID 3008fa01-492a-42e2-ab9b-a0a9d12823b8
which can be used as unique global reference for Irc16
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
BADCALL (ELF)
BADCALL is a Trojan malware variant used by the group Lazarus Group.
Internal MISP references
UUID 350817e8-4d70-455e-b1fd-000bed4a4cf4
which can be used as unique global reference for BADCALL (ELF)
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Bashlite
Bashlite is a malware family which infects Linux systems in order to launch distributed denial-of-service attacks (DDoS). Originally it was also known under the name Bashdoor, but this term now refers to the exploit method used by the malware. It has been used to launch attacks of up to 400 Gbps.
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Bashlite.
Known Synonyms |
---|
Gafgyt |
gayfgt |
lizkebab |
qbot |
torlus |
Internal MISP references
UUID 81917a93-6a70-4334-afe2-56904c1fafe9
which can be used as unique global reference for Bashlite
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.bashlite - webarchive
- https://cybersecurity.att.com/blogs/labs-research/code-similarity-analysis-with-r2diaphora - webarchive
- https://www.avira.com/en/blog/a-gafgyt-variant-that-exploits-pulse-secure-cve-2020-8218 - webarchive
- https://securityscorecard.com/wp-content/uploads/2024/01/Report-A-Detailed-Analysis-Of-The-Gafgyt-Malware-Targeting-IoT-Devices.pdf - webarchive
- https://www.blackberry.com/content/dam/blackberry-com/asset/enterprise/pdf/direct/report-bb-2021-threat-report.pdf - webarchive
- https://blog.netlab.360.com/public-cloud-threat-intelligence-202203/ - webarchive
- https://blog.netlab.360.com/gafgtyt_tor-and-necro-are-on-the-move-again/ - webarchive
- https://www.uptycs.com/blog/mirai-code-re-use-in-gafgyt - webarchive
- https://maxkersten.nl/binary-analysis-course/malware-analysis/corona-ddos-bot/ - webarchive
- https://www.uptycs.com/blog/discovery-of-simps-botnet-leads-ties-to-keksec-group - webarchive
- https://vb2020.vblocalhost.com/uploads/VB2020-Liu.pdf - webarchive
- https://blog.netlab.360.com/some_details_of_the_ddos_attacks_targeting_ukraine_and_russia_in_recent_days/ - webarchive
- https://www.virusbulletin.com/uploads/pdf/conference/vb2015/KalnaiHorejsi-VB2015.pdf - webarchive
- https://www.nozominetworks.com/blog/could-threat-actors-be-downgrading-their-malware-to-evade-detection/ - webarchive
- https://unit42.paloaltonetworks.com/unit42-multi-exploit-iotlinux-botnets-mirai-gafgyt-target-apache-struts-sonicwall/ - webarchive
- https://cujo.com/mirai-gafgyt-with-new-ddos-modules-discovered/ - webarchive
- https://info.spamhaus.com/hubfs/Botnet%20Reports/Jan-Jun%202024%20Botnet%20Threat%20Update.pdf - webarchive
- http://blog.trendmicro.com/trendlabs-security-intelligence/bashlite-affects-devices-running-on-busybox/ - webarchive
- https://blog.cyber5w.com/gafgyt-backdoor-analysis - webarchive
- https://unit42.paloaltonetworks.com/hoaxcalls-mirai-target-legacy-symantec-web-gateways/ - webarchive
- https://blog.netlab.360.com/wo-men-kan-dao-de-wu-ke-lan-bei-ddosgong-ji-xi-jie/ - webarchive
- https://krebsonsecurity.com/2016/09/krebsonsecurity-hit-with-record-ddos/ - webarchive
- https://blog.netlab.360.com/the-gafgyt-variant-vbot-and-its-31-campaigns/ - webarchive
- https://www.aquasec.com/blog/gafgyt-malware-variant-exploits-gpu-power-and-cloud-native-environments/ - webarchive
- https://unit42.paloaltonetworks.com/new-hoaxcalls-ddos-botnet/ - webarchive
- https://unit42.paloaltonetworks.com/cve-2022-22954-vmware-vulnerabilities/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
BCMPUPnP_Hunter
Internal MISP references
UUID d8dd47a5-85fe-4f07-89dc-00301468d209
which can be used as unique global reference for BCMPUPnP_Hunter
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
BianLian (ELF)
Internal MISP references
UUID f6be433e-7ed0-4777-876b-e3e2ba7d5c7f
which can be used as unique global reference for BianLian (ELF)
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.bianlian - webarchive
- https://blog.talosintelligence.com/talos-ir-q2-2023-quarterly-recap/ - webarchive
- https://rhisac.org/threat-intelligence/bianlian-ransomware-expanding-c2-infrastructure-and-operational-tempo/ - webarchive
- https://www.youtube.com/live/O2Wx7mQHR2I?si=uydJupvHK6sxxw3n - webarchive
- https://redacted.com/blog/bianlian-ransomware-gang-gives-it-a-go/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
BiBi-Linux
According to Security Joes, this malware is an x64 ELF executable, lacking obfuscation or protective measures. It allows attackers to specify target folders and can potentially destroy an entire operating system if run with root permissions. During execution, it produces extensive output, which can be mitigated using the "nohup" command. It also leverages multiple threads and a queue to corrupt files concurrently, enhancing its speed and reach. Its actions include overwriting files, renaming them with a random string containing "BiBi," and excluding certain file types from corruption.
Internal MISP references
UUID efec7bb0-4ec7-4c97-a8a9-28e0fea19852
which can be used as unique global reference for BiBi-Linux
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Bifrost
Linux version of the bifrose malware that originally targeted Windows platform only. The backdoor has the ability to perform file management, start or end a process, or start a remote shell. The connection is encrypted using a modified RC4 algorithm.
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Bifrost.
Known Synonyms |
---|
elf.bifrose |
Internal MISP references
UUID 8fa6dd0e-b630-419f-bd01-5271dd8f27c6
which can be used as unique global reference for Bifrost
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.bifrost - webarchive
- https://twitter.com/strinsert1Na/status/1595553530579890176 - webarchive
- https://teamt5.org/tw/posts/technical-analysis-on-backdoor-bifrost-of-the-Chinese-apt-group-huapi/ - webarchive
- https://cyberandramen.net/2022/12/30/a-quick-look-at-elf-bifrose/ - webarchive
- https://jp.security.ntt/resources/EN-BlackTech_2021.pdf - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
BigViktor
A DDoS bot abusing CVE-2020-8515 to target DrayTek Vigor routers. It uses a wordlist-based DGA to generate its C&C domains.
Internal MISP references
UUID 901ab128-2d23-41d7-a9e7-6a34e281804e
which can be used as unique global reference for BigViktor
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
BioSet
Internal MISP references
UUID 8e301f58-acef-48e7-ad8b-c27d3ed38eed
which can be used as unique global reference for BioSet
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Black Basta (ELF)
ESXi encrypting ransomware, using a combination of the stream cipher ChaCha20 and RSA.
Internal MISP references
UUID 35c86fef-18fe-491c-ad3c-13f98e8f5584
which can be used as unique global reference for Black Basta (ELF)
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.blackbasta - webarchive
- https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-131a - webarchive
- https://www.rapid7.com/blog/post/2024/05/10/ongoing-social-engineering-campaign-linked-to-black-basta-ransomware-operators/ - webarchive
- https://quadrantsec.com/resource/technical-analysis/black-basta-malware-overview - webarchive
- https://www.cynet.com/blog/orion-threat-alert-qakbot-ttps-arsenal-and-the-black-basta-ransomware/ - webarchive
- https://noticeofpleadings.com/crackedcobaltstrike/files/ComplaintAndSummons/1%20-Microsoft%20Cobalt%20Strike%20-%20Complaint(907040021.9).pdf - webarchive
- https://blogs.vmware.com/security/2022/09/esxi-targeting-ransomware-the-threats-that-are-after-your-virtual-machines-part-1.html - webarchive
- https://stairwell.com/resources/stairwell-threat-report-black-basta-overview-and-detection-rules/ - webarchive
- https://www.microsoft.com/en-us/security/blog/2024/07/29/ransomware-operators-exploit-esxi-hypervisor-vulnerability-for-mass-encryption/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
BlackCat (ELF)
ALPHV, also known as BlackCat or Noberus, is a ransomware family that is deployed as part of Ransomware as a Service (RaaS) operations. ALPHV is written in the Rust programming language and supports execution on Windows, Linux-based operating systems (Debian, Ubuntu, ReadyNAS, Synology), and VMWare ESXi. ALPHV is marketed as ALPHV on cybercrime forums, but is commonly called BlackCat by security researchers due to an icon of a black cat appearing on its leak site. ALPHV has been observed being deployed in ransomware attacks since November 18, 2021.
ALPHV can be configured to encrypt files using either the AES or ChaCha20 algorithms. In order to maximize the amount of ransomed data, ALPHV can delete volume shadow copies, stop processes and services, and stop virtual machines on ESXi servers. ALPHV can self-propagate by using PsExec to remote execute itself on other hosts on the local network.
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular BlackCat (ELF).
Known Synonyms |
---|
ALPHV |
Noberus |
Internal MISP references
UUID 860e9d03-830e-4410-ac89-75b6eb89e7e5
which can be used as unique global reference for BlackCat (ELF)
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.blackcat - webarchive
- https://killingthebear.jorgetesta.tech/actors/alphv - webarchive
- https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RE54L7v - webarchive
- https://securityintelligence.com/posts/blackcat-ransomware-levels-up-stealth-speed-exfiltration/ - webarchive
- https://x.com/vxunderground/status/1731138180672344095?t=reBMQQFFMGQ_zkV8KmL_LA&s=01 - webarchive
- https://mssplab.github.io/threat-hunting/2023/07/13/malware-analysis-blackcat.html - webarchive
- https://noticeofpleadings.com/crackedcobaltstrike/files/ComplaintAndSummons/1%20-Microsoft%20Cobalt%20Strike%20-%20Complaint(907040021.9).pdf - webarchive
- https://blog.group-ib.com/blackcat - webarchive
- https://github.com/rivitna/Malware/tree/main/BlackCat/ALPHV3 - webarchive
- https://www.crowdstrike.com/blog/hypervisor-jackpotting-lack-of-antivirus-support-opens-the-door-to-adversaries/ - webarchive
- https://krebsonsecurity.com/2022/01/who-wrote-the-alphv-blackcat-ransomware-strain/ - webarchive
- https://www.cisa.gov/sites/default/files/2023-11/aa23-320a_scattered_spider.pdf - webarchive
- https://blog.sekoia.io/exposing-fakebat-loader-distribution-methods-and-adversary-infrastructure/ - webarchive
- https://blog.emsisoft.com/en/40931/ransomware-profile-alphv/ - webarchive
- https://securelist.com/a-bad-luck-blackcat/106254/ - webarchive
- https://www.forescout.com/resources/analysis-of-an-alphv-incident - webarchive
- https://thehackernews.com/2022/04/researchers-connect-blackcat-ransomware.html - webarchive
- https://www.computerweekly.com/news/252525240/ALPHV-BlackCat-ransomware-family-becoming-more-dangerous - webarchive
- https://securelist.com/new-ransomware-trends-in-2022/106457/ - webarchive
- https://www.advintel.io/post/blackcat-in-a-shifting-threat-landscape-it-helps-to-land-on-your-feet-tech-dive - webarchive
- https://www.intrinsec.com/alphv-ransomware-gang-analysis/ - webarchive
- https://blog.talosintelligence.com/2022/03/from-blackmatter-to-blackcat-analyzing.html - webarchive
- https://securityscorecard.com/research/the-increase-in-ransomware-attacks-on-local-governments - webarchive
- https://twitter.com/sisoma2/status/1473243875158499330 - webarchive
- https://www.bleepingcomputer.com/news/security/hive-ransomware-ports-its-linux-vmware-esxi-encryptor-to-rust/ - webarchive
- https://www.microsoft.com/security/blog/2022/05/09/ransomware-as-a-service-understanding-the-cybercrime-gig-economy-and-how-to-protect-yourself - webarchive
- https://www.zdnet.com/article/blackcat-ransomware-implicated-in-attack-on-german-oil-companies/ - webarchive
- https://news.sophos.com/en-us/2022/07/14/blackcat-ransomware-attacks-not-merely-a-byproduct-of-bad-luck/ - webarchive
- https://www.trellix.com/en-us/about/newsroom/stories/threat-labs/blackcat-ransomware-as-a-service.html - webarchive
- https://blogs.vmware.com/security/2022/09/esxi-targeting-ransomware-the-threats-that-are-after-your-virtual-machines-part-1.html - webarchive
- https://www.theregister.com/2022/03/22/talos-ransomware-blackcat/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
BlackMatter (ELF)
Internal MISP references
UUID 1277a4bf-466c-40bc-b000-f55cbd0994a7
which can be used as unique global reference for BlackMatter (ELF)
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.blackmatter - webarchive
- https://medium.com/s2wlab/blackmatter-x-babuk-using-the-same-web-server-for-sharing-leaked-files-d01c20a74751 - webarchive
- https://www.bleepingcomputer.com/news/security/linux-version-of-blackmatter-ransomware-targets-vmware-esxi-servers/ - webarchive
- https://www.vmware.com/content/dam/digitalmarketing/vmware/en/pdf/docs/vmw-exposing-malware-in-linux-based-multi-cloud-environments.pdf - webarchive
- https://www.crowdstrike.com/blog/big-game-hunting-on-the-rise-again-according-to-ecrime-index/ - webarchive
- https://blog.group-ib.com/blackmatter2 - webarchive
- https://therecord.media/darkside-ransomware-gang-moves-some-of-its-bitcoin-after-revil-got-hit-by-law-enforcement/ - webarchive
- https://www.crowdstrike.com/blog/how-big-game-hunting-ttps-shifted-after-darkside-pipeline-attack/ - webarchive
- https://twitter.com/VK_Intel/status/1423188690126266370 - webarchive
- https://www.elliptic.co/blog/darkside-bitcoins-on-the-move-following-government-cyberattack-against-revil-ransomware-group - webarchive
- https://www.bleepingcomputer.com/news/security/darkside-ransomware-rushes-to-cash-out-7-million-in-bitcoin/ - webarchive
- https://medium.com/s2wlab/grooves-thoughts-on-blackmatter-babuk-and-interruption-in-the-supply-of-cheese-in-the-b5328bc764f2 - webarchive
- https://us-cert.cisa.gov/ncas/alerts/aa21-291a - webarchive
- https://umbrella.cisco.com/blog/cybersecurity-threat-spotlight-blackmatter-lockbit-thor - webarchive
- https://symantec.broadcom.com/hubfs/The_Ransomware_Threat_September_2021.pdf - webarchive
- https://www.bleepingcomputer.com/news/security/blackmatter-ransomware-moves-victims-to-lockbit-after-shutdown/ - webarchive
- https://www.mandiant.com/resources/chasing-avaddon-ransomware - webarchive
- https://thehackernews.com/2022/04/researchers-connect-blackcat-ransomware.html - webarchive
- https://www.crowdstrike.com/blog/carbon-spider-embraces-big-game-hunting-part-2/ - webarchive
- https://medium.com/s2wlab/groove-x-ramp-the-relation-between-groove-babuk-ramp-and-blackmatter-f75644f8f92d - webarchive
- https://twitter.com/GelosSnake/status/1451465959894667275 - webarchive
- https://blog.talosintelligence.com/2022/03/from-blackmatter-to-blackcat-analyzing.html - webarchive
- https://www.microsoft.com/security/blog/2022/05/09/ransomware-as-a-service-understanding-the-cybercrime-gig-economy-and-how-to-protect-yourself - webarchive
- https://blogs.blackberry.com/en/2021/09/threat-thursday-blackmatter-ransomware-as-a-service - webarchive
- https://www.mcafee.com/blogs/enterprise/mcafee-enterprise-atr/how-groove-gang-is-shaking-up-the-ransomware-as-a-service-market-to-empower-affiliates/ - webarchive
- https://news.sophos.com/en-us/2021/08/09/blackmatter-ransomware-emerges-from-the-shadow-of-darkside/ - webarchive
- https://blogs.vmware.com/security/2022/09/esxi-targeting-ransomware-the-threats-that-are-after-your-virtual-machines-part-1.html - webarchive
- https://www.hhs.gov/sites/default/files/demystifying-blackmatter.pdf - webarchive
- https://www.youtube.com/watch?v=NIiEcOryLpI - webarchive
- https://blog.group-ib.com/blackmatter# - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Blackrota
Internal MISP references
UUID a30aedcc-562e-437a-827c-55bc00cf3506
which can be used as unique global reference for Blackrota
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.blackrota - webarchive
- https://blog.netlab.360.com/blackrota-an-obfuscated-backdoor-written-in-go-en/ - webarchive
- https://www.kryptoslogic.com/blog/2020/12/automated-string-de-gobfuscation/ - webarchive
- https://www.intezer.com/blog/cloud-security/top-linux-cloud-threats-of-2020/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
BlackSuit (ELF)
According to Trend Micro, this ransomware has significant code overlap with Royal Ransomware.
Internal MISP references
UUID 5bdbeaae-0def-4547-9940-33ad94060955
which can be used as unique global reference for BlackSuit (ELF)
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
BOLDMOVE (ELF)
According to Mandiant, this malware family is attributed to potential chinese background and directly related to observed exploitation of Fortinet's SSL-VPN (CVE-2022-42475). There is also a Windows variant.
Internal MISP references
UUID 8f347147-c34e-4698-9439-c640233fca15
which can be used as unique global reference for BOLDMOVE (ELF)
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.boldmove - webarchive
- https://services.google.com/fh/files/misc/01-chinese-espionage-article-m-trends-2024.pdf - webarchive
- https://thehackernews.com/2023/01/new-chinese-malware-spotted-exploiting.html - webarchive
- https://www.ncsc.nl/binaries/ncsc/documenten/publicaties/2024/februari/6/mivd-aivd-advisory-coathanger-tlp-clear/TLP-CLEAR+MIVD+AIVD+Advisory+COATHANGER.pdf - webarchive
- https://www.mandiant.com/resources/blog/chinese-actors-exploit-fortios-flaw - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Break out the Box
This is a pentesting tool and according to the author, "BOtB is a container analysis and exploitation tool designed to be used by pentesters and engineers while also being CI/CD friendly with common CI/CD technologies.".
It has been observed being used by TeamTNT in their activities for spreading crypto-mining malware.
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Break out the Box.
Known Synonyms |
---|
BOtB |
Internal MISP references
UUID 57c9ab70-7133-441a-af66-10c0e4eb898b
which can be used as unique global reference for Break out the Box
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
BotenaGo
According to Alien Labs, this malware targets embedded devices including routers with more than 30 exploits. SourceCode: https://github.com/Egida/kek/blob/19991ef983f838287aa9362b78b4ed8da0929184/loader_multi.go (2021-10-16)
Internal MISP references
UUID dffcc168-cb76-4ae6-b913-c369e92c614b
which can be used as unique global reference for BotenaGo
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.botenago - webarchive
- https://cybersecurity.att.com/blogs/labs-research/shikitega-new-stealthy-malware-targeting-linux - webarchive
- https://www.nozominetworks.com/blog/new-botenago-variant-discovered-by-nozomi-networks-labs/ - webarchive
- https://cybersecurity.att.com/blogs/labs-research/botenago-strike-again-malware-source-code-uploaded-to-github - webarchive
- https://cybersecurity.att.com/blogs/labs-research/att-alien-labs-finds-new-golang-malwarebotenago-targeting-millions-of-routers-and-iot-devices-with-more-than-30-exploits - webarchive
- https://lifars.com/2022/01/newly-found-malware-threatens-iot-devices/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
BPFDoor
BPFDoor is a passive backdoor used by a China-based threat actor. This backdoor supports multiple protocols for communicating with a C2 including TCP, UDP, and ICMP allowing the threat actor a variety of mechanisms to interact with the implant.
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular BPFDoor.
Known Synonyms |
---|
JustForFun |
Internal MISP references
UUID 3c7082b6-0181-4064-8e35-ab522b49200f
which can be used as unique global reference for BPFDoor
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.bpfdoor - webarchive
- https://www.bleepingcomputer.com/news/security/stealthier-version-of-linux-bpfdoor-malware-spotted-in-the-wild/ - webarchive
- https://www.deepinstinct.com/blog/bpfdoor-malware-evolves-stealthy-sniffing-backdoor-ups-its-game - webarchive
- https://www.pwc.com/gx/en/issues/cybersecurity/cyber-threat-intelligence/cyber-year-in-retrospect/yir-cyber-threats-report-download.pdf - webarchive
- https://www.mandiant.com/resources/blog/chinese-espionage-tactics - webarchive
- https://www.trendmicro.com/en_us/research/23/g/detecting-bpfdoor-backdoor-variants-abusing-bpf-filters.html - webarchive
- https://www.sandflysecurity.com/blog/bpfdoor-an-evasive-linux-backdoor-technical-analysis/ - webarchive
- https://troopers.de/troopers22/talks/7cv8pz/ - webarchive
- https://twitter.com/cyb3rops/status/1523227511551033349 - webarchive
- https://elastic.github.io/security-research/intelligence/2022/05/04.bpfdoor/article/# - webarchive
- https://unfinished.bike/fun-with-the-new-bpfdoor-2023 - webarchive
- https://twitter.com/CraigHRowland/status/1523266585133457408 - webarchive
- https://www.crowdstrike.com/blog/how-to-hunt-for-decisivearchitect-and-justforfun-implant/ - webarchive
- https://exatrack.com/public/Tricephalic_Hellkeeper.pdf - webarchive
- https://nikhilh-20.github.io/blog/cbpf_bpfdoor/ - webarchive
- https://lolcads.github.io/posts/2023/12/bpf_memory_forensics_with_volatility3/ - webarchive
- https://doublepulsar.com/bpfdoor-an-active-chinese-global-surveillance-tool-54b078f1a896 - webarchive
- https://blog.qualys.com/vulnerabilities-threat-research/2022/08/01/heres-a-simple-script-to-detect-the-stealthy-nation-state-bpfdoor - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
brute_ratel
Internal MISP references
UUID 2fa4ac4e-3f89-4fd0-b4fd-2c776dcf69d8
which can be used as unique global reference for brute_ratel
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Bvp47
Pangu Lab discovered this backdoor during a forensic investigation in 2013. They refer to related incidents as "Operation Telescreen".
Internal MISP references
UUID 0492f9bf-3c5d-4c17-993b-2b53d0fb06f7
which can be used as unique global reference for Bvp47
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.bvp47 - webarchive
- https://www.pangulab.cn/files/The_Bvp47_a_top-tier_backdoor_of_us_nsa_equation_group_ii.en.pdf - webarchive
- https://www.pangulab.cn/files/The_Bvp47_a_top-tier_backdoor_of_us_nsa_equation_group.en.pdf - webarchive
- https://www.pangulab.cn/en/post/the_bvp47_a_top-tier_backdoor_of_us_nsa_equation_group/ - webarchive
- https://exatrack.com/public/Tricephalic_Hellkeeper.pdf - webarchive
- https://thehackernews.com/2022/02/chinese-experts-uncover-details-of.html - webarchive
- https://www.bleepingcomputer.com/news/security/nsa-linked-bvp47-linux-backdoor-widely-undetected-for-10-years/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Caja
Linux malware cross-compiled for x86, MIPS, ARM. XOR encoded strings, 13 commands supported for its C&C, including downloading, file modification and execution and ability to run shell commands.
Internal MISP references
UUID 06816c22-be7c-44db-8d0d-395ab306bb9b
which can be used as unique global reference for Caja
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Caligula
According to Avast Decoded, Caligula is an IRC multiplatform bot that allows to perform DDoS attacks. It is written in Go and distributed in ELF files targeting Intel 32/64bit code, as well as ARM 32bit and PowerPC 64bit. It is based on the Hellabot open source project.
Internal MISP references
UUID c936f24c-c04a-4cab-9ac6-6384a2d4c283
which can be used as unique global reference for Caligula
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Capoae
XMRig-based mining malware written in Go.
Internal MISP references
UUID c1b0528b-c674-4c76-8e1d-5846ba8af261
which can be used as unique global reference for Capoae
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
CDorked
This is in the same family as eBury, Calfbot, and is also likely related to DarkLeech
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular CDorked.
Known Synonyms |
---|
CDorked.A |
Internal MISP references
UUID bb9eaaec-97c9-4014-94dd-129cecf31ff0
which can be used as unique global reference for CDorked
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.cdorked - webarchive
- https://www.welivesecurity.com/2013/05/02/the-stealthiness-of-linuxcdorked-a-clarification/ - webarchive
- https://www.symantec.com/security-center/writeup/2013-050214-5501-99 - webarchive
- https://blog.sucuri.net/2014/03/windigo-linux-analysis-ebury-and-cdorked.html - webarchive
- https://blogs.cisco.com/security/linuxcdorked-faqs - webarchive
- https://www.welivesecurity.com/2013/04/26/linuxcdorked-new-apache-backdoor-in-the-wild-serves-blackhole/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
CDRThief
Internal MISP references
UUID 27d06ac9-42c4-433a-b1d7-660710d9e8df
which can be used as unique global reference for CDRThief
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Cephei
Internal MISP references
UUID baa0704b-50d8-48af-91e1-049f30f422cc
which can be used as unique global reference for Cephei
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Cetus
Internal MISP references
UUID 7a226df2-9599-4002-9a38-b044e16f76a9
which can be used as unique global reference for Cetus
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Chalubo
Sophos describes this malware as a DDoS bot, with its name originating from ChaCha-Lua-bot due to its use of ChaCha cipher and Lua. Variants exist for multiple architectures and it incorporates code from XorDDoS and Mirai.
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Chalubo.
Known Synonyms |
---|
ChaChaDDoS |
Internal MISP references
UUID af91c777-93f7-4b7f-981f-141478972011
which can be used as unique global reference for Chalubo
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.chalubo - webarchive
- https://news.sophos.com/en-us/2018/10/22/chalubo-botnet-wants-to-ddos-from-your-server-or-iot-device/ - webarchive
- https://blog.centurylink.com/the-pumpkin-eclipse/ - webarchive
- https://blog.lumen.com/the-pumpkin-eclipse/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Chaos (ELF)
Multi-functional malware written in Go, targeting both Linux and Windows, evolved from elf.kaiji.
Internal MISP references
UUID ef03e3c3-32d5-483a-bd1f-97dd531c4bca
which can be used as unique global reference for Chaos (ELF)
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Chapro
Internal MISP references
UUID 700366d8-4036-4e48-9a5f-bd6e09fb9b6b
which can be used as unique global reference for Chapro
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Chisel (ELF)
Chisel is an open-source project by Jaime Pillora (jpillora) that allows tunneling TCP and UDP connections via HTTP. It is available across platforms and written in Go. While benign in itself, Chisel has been utilized by multiple threat actors. It was for example observed by SentinelOne during a PYSA ransomware campaign to achieve persistence and used as backdoor. Github: https://github.com/jpillora/chisel
Internal MISP references
UUID e5600185-39b7-49a0-bd60-a6806c7d47dd
which can be used as unique global reference for Chisel (ELF)
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Clop (ELF)
ELF version of clop ransomware.
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Clop (ELF).
Known Synonyms |
---|
Cl0p |
Internal MISP references
UUID 3d11ec52-9ca8-4d83-99d4-6658f306e8e4
which can be used as unique global reference for Clop (ELF)
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.clop - webarchive
- https://blog.talosintelligence.com/talos-ir-q2-2023-quarterly-recap/ - webarchive
- https://www.helpnetsecurity.com/2023/02/07/cl0p-ransomware-decryptor-linux/ - webarchive
- https://www.sentinelone.com/labs/cl0p-ransomware-targets-linux-systems-with-flawed-encryption-decryptor-available/ - webarchive
- https://www.bleepingcomputer.com/news/security/march-2023-broke-ransomware-attack-records-with-459-incidents/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Cloud Snooper
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Cloud Snooper.
Known Synonyms |
---|
Snoopy |
Internal MISP references
UUID 0b1c514d-f617-4380-a28c-a1ed305a7538
which can be used as unique global reference for Cloud Snooper
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.cloud_snooper - webarchive
- https://securelist.com/an-overview-of-targeted-attacks-and-apts-on-linux/98440/ - webarchive
- https://intezer.com/blog/linux/elf-malware-analysis-101-linux-threats-no-longer-an-afterthought - webarchive
- https://www.sophos.com/en-us/medialibrary/PDFs/technical-papers/sophoslabs-cloud-snooper-report.pdf - webarchive
- https://www.intezer.com/blog/cloud-security/top-linux-cloud-threats-of-2020/ - webarchive
- https://news.sophos.com/wp-content/uploads/2020/02/CloudSnooper_report.pdf - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
ConnectBack
ConnectBack malware is a type of malicious software designed to establish unauthorized connections from an infected system to a remote server. Once a victim's device is compromised, ConnectBack creates a covert channel for communication, allowing the attacker to remotely control and gather sensitive information from the compromised system.
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular ConnectBack.
Known Synonyms |
---|
Getshell |
Internal MISP references
UUID 82c57d1b-c11b-44f7-9675-2f0d23fb543f
which can be used as unique global reference for ConnectBack
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Conti (ELF)
Ransomware
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Conti (ELF).
Known Synonyms |
---|
Conti Locker |
Internal MISP references
UUID c1ab8323-ce61-409a-80f3-b945c8ffcd42
which can be used as unique global reference for Conti (ELF)
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.conti - webarchive
- https://www.esentire.com/blog/analysis-of-leaked-conti-intrusion-procedures-by-esentires-threat-response-unit-tru - webarchive
- https://www.microsoft.com/security/blog/2022/05/09/ransomware-as-a-service-understanding-the-cybercrime-gig-economy-and-how-to-protect-yourself - webarchive
- https://www.youtube.com/watch?v=cYx7sQRbjGA - webarchive
- https://resources.prodaft.com/wazawaka-report - webarchive
- https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RE54L7v - webarchive
- https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2022/06/23093553/Common-TTPs-of-the-modern-ransomware_low-res.pdf - webarchive
- https://www.secureworks.com/blog/gold-ulrick-continues-conti-operations-despite-public-disclosures - webarchive
- https://blogs.vmware.com/security/2022/09/esxi-targeting-ransomware-the-threats-that-are-after-your-virtual-machines-part-1.html - webarchive
- https://www.advintel.io/post/advintel-s-state-of-emotet-aka-spmtools-displays-over-million-compromised-machines-through-2022 - webarchive
- https://www.threatstop.com/blog/first-conti-then-hive-costa-rica-gets-hit-with-ransomware-again - webarchive
- https://damonmccoy.com/papers/Ransomware_eCrime22.pdf - webarchive
- https://www.trellix.com/en-us/about/newsroom/stories/threat-labs/conti-group-targets-esxi-hypervisors-with-its-linux-variant.html - webarchive
- https://securelist.com/new-ransomware-trends-in-2022/106457/ - webarchive
- https://intel471.com/blog/malware-before-ransomware-trojan-information-stealer-cobalt-strike - webarchive
- https://www.justice.gov/opa/pr/multiple-foreign-nationals-charged-connection-trickbot-malware-and-conti-ransomware - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Cpuminer (ELF)
This was observed to be pushed by IoT malware, abusing devices for LiteCoin and BitCoin mining.
Internal MISP references
UUID 8196b6f6-386e-4499-b269-4e5c65f74141
which can be used as unique global reference for Cpuminer (ELF)
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Cr1ptT0r
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Cr1ptT0r.
Known Synonyms |
---|
CriptTor |
Internal MISP references
UUID 196b20ec-c3d1-4136-ab94-a2a6cc150e74
which can be used as unique global reference for Cr1ptT0r
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.cr1ptt0r - webarchive
- https://www.bleepingcomputer.com/news/security/cr1ptt0r-ransomware-infects-d-link-nas-devices-targets-embedded-systems/ - webarchive
- https://resolverblog.blogspot.com/2019/02/d-link-dns-320-nas-cr1ptt0r-ransomware.html - webarchive
- https://resolverblog.blogspot.com/2019/03/de-cr1pt0r-tool-cr1pt0r-ransomware.html - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
CronRAT
A malware written in Bash that hides in the Linux calendar system on February 31st. Observed in relation to Magecart attacks.
Internal MISP references
UUID c49062cc-ceef-4794-9d8a-93ede434ecfd
which can be used as unique global reference for CronRAT
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
CyclopsBlink
According to CISA, Cyclops Blink appears to be a replacement framework for the VPNFilter malware exposed in 2018, and which exploited network devices, primarily small office/home office (SOHO) routers and network attached storage (NAS) devices. Cyclops Blink has been deployed since at least June 2019, fourteen months after VPNFilter was disrupted. In common with VPNFilter, Cyclops Blink deployment also appears indiscriminate and widespread. The actor has so far primarily deployed Cyclops Blink to WatchGuard and ASUS devices, but it is likely that Sandworm would be capable of compiling the malware for other architectures and firmware.
Internal MISP references
UUID 76d4b754-e025-41c5-a767-7b00a39bd255
which can be used as unique global reference for CyclopsBlink
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.cyclops_blink - webarchive
- https://www.cisa.gov/uscert/ncas/alerts/aa22-054a - webarchive
- https://www.theregister.com/2022/03/18/cyclops_asus_routers/ - webarchive
- https://www.justice.gov/opa/pr/justice-department-announces-court-authorized-disruption-botnet-controlled-russian-federation - webarchive
- https://www.trendmicro.com/content/dam/trendmicro/global/en/research/22/c/cyclops-blink-sets-sights-on-asus-routers/Appendix_Cyclops%20Blink%20Sets%20Sights%20on%20ASUS%20Routers.pdf - webarchive
- https://www.bleepingcomputer.com/news/security/cisa-warns-orgs-of-watchguard-bug-exploited-by-russian-state-hackers/ - webarchive
- https://www.shadowserver.org/news/shadowserver-special-reports-cyclops-blink/ - webarchive
- https://www.bleepingcomputer.com/news/security/asus-warns-of-cyclops-blink-malware-attacks-targeting-routers/ - webarchive
- https://www.justice.gov/opa/video/attorney-general-merrick-b-garland-announces-enforcement-actions-disrupt-and-prosecute - webarchive
- https://github.com/trendmicro/research/blob/main/cyclops_blink/c2-scripts/check.py - webarchive
- https://www.justice.gov/opa/press-release/file/1491281/download - webarchive
- https://www.bleepingcomputer.com/news/security/us-disrupts-russian-cyclops-blink-botnet-before-being-used-in-attacks/ - webarchive
- https://inquest.net/blog/2022/04/07/ukraine-cyberwar-overview - webarchive
- https://www.trendmicro.com/en_us/research/22/c/cyclops-blink-sets-sights-on-asus-routers--.html - webarchive
- https://attack.mitre.org/groups/G0034 - webarchive
- https://www.splunk.com/en_us/blog/security/strt-ta03-cpe-destructive-software.html - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Dacls (ELF)
According to PCrisk, Dacls is the name of a remote access Trojan (RAT), a malicious program that allows cyber criminals to control infected computers remotely.
Research shows that this malware is tied to Lazarus Group (a group of cyber criminals) and targets Linux and the Windows Operating System. Typically, cyber criminals use RATs to steal sensitive, confidential information, infect systems with other malware, and so on. In any case, no RAT is harmless and should be uninstalled immediately.
Internal MISP references
UUID 2e5e2a7e-4ee5-4954-9c92-e9b21649ae1b
which can be used as unique global reference for Dacls (ELF)
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.dacls - webarchive
- https://securelist.com/an-overview-of-targeted-attacks-and-apts-on-linux/98440/ - webarchive
- https://blog.netlab.360.com/dacls-the-dual-platform-rat/ - webarchive
- https://intezer.com/blog/linux/elf-malware-analysis-101-linux-threats-no-longer-an-afterthought - webarchive
- https://securelist.com/apt-trends-report-q2-2020/97937/ - webarchive
- https://vblocalhost.com/uploads/VB2021-Park.pdf - webarchive
- https://ti.qianxin.com/uploads/2020/02/13/cb78386a082f465f259b37dae5df4884.pdf - webarchive
- https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/ - webarchive
- https://www.sygnia.co/mata-framework - webarchive
- https://www.intezer.com/blog/cloud-security/top-linux-cloud-threats-of-2020/ - webarchive
- https://securelist.com/mata-multi-platform-targeted-malware-framework/97746/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Dark
Mirai variant exploiting CVE-2021-20090 and CVE2021-35395 for spreading.
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Dark.
Known Synonyms |
---|
Dark.IoT |
Internal MISP references
UUID d499e7ad-332f-4057-b31d-a69916408057
which can be used as unique global reference for Dark
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.dark - webarchive
- https://www.radware.com/getmedia/18d24c2d-c092-4a61-9ad6-ebb92b7a49b8/Alert_Realtek_SDK.aspx - webarchive
- https://www.lacework.com/blog/kinsing-dark-iot-botnet-among-threats-targeting-cve-2022-26134/ - webarchive
- https://twitter.com/ESETresearch/status/1440052837820428298?s=20 - webarchive
- https://blogs.juniper.net/en-us/threat-research/attacks-continue-against-realtek-vulnerabilities - webarchive
- https://www.radware.com/getmedia/d312a5fa-2d8d-4c1e-b31e-73046f24bf35/Alert-Dark-OMIGOD.aspx - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
DarkCracks
A sophisticated payload delivery and upgrade framework, discovered in 2024. DarkCracks exploits compromised GLPI and WordPress sites to function as Downloaders and C2 servers.
Internal MISP references
UUID 043c46fc-b98a-438e-b071-3ac76380f082
which can be used as unique global reference for DarkCracks
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Dark Nexus
Internal MISP references
UUID dfba0c8f-9d06-448b-817e-6fffa1b22cb9
which can be used as unique global reference for Dark Nexus
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.darknexus - webarchive
- https://www.stratosphereips.org/blog/2020/6/8/dark-nexus-the-old-the-new-and-the-ugly - webarchive
- https://www.trendmicro.com/en_us/research/21/l/the-evolution-of-iot-linux-malware-based-on-mitre-att&ck-ttps.html - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
DarkSide (ELF)
Internal MISP references
UUID 61796628-c37b-4284-9aa4-9f054cc6c3c2
which can be used as unique global reference for DarkSide (ELF)
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.darkside - webarchive
- https://www.vmware.com/content/dam/digitalmarketing/vmware/en/pdf/docs/vmw-exposing-malware-in-linux-based-multi-cloud-environments.pdf - webarchive
- https://www.bleepingcomputer.com/news/security/chemical-distributor-pays-44-million-to-darkside-ransomware/ - webarchive
- https://www.trendmicro.com/en_us/research/21/e/darkside-linux-vms-targeted.html - webarchive
- https://www.crowdstrike.com/blog/big-game-hunting-on-the-rise-again-according-to-ecrime-index/ - webarchive
- https://www.guidepointsecurity.com/from-zloader-to-darkside-a-ransomware-story/ - webarchive
- https://www.pwc.co.uk/issues/cyber-security-services/insights/what-is-behind-ransomware-attacks-increase.html - webarchive
- https://blog.gigamon.com/2021/05/17/tracking-darkside-and-ransomware-the-network-view/ - webarchive
- https://www.justice.gov/opa/pr/department-justice-seizes-23-million-cryptocurrency-paid-ransomware-extortionists-darkside - webarchive
- https://www.intel471.com/blog/darkside-ransomware-shut-down-revil-avaddon-cybercrime - webarchive
- https://www.mcafee.com/blogs/other-blogs/mcafee-labs/darkside-ransomware-victims-sold-short/ - webarchive
- https://blog.group-ib.com/blackmatter2 - webarchive
- https://www.wsj.com/articles/colonial-pipeline-ceo-tells-why-he-paid-hackers-a-4-4-million-ransom-11621435636 - webarchive
- https://www.maltego.com/blog/chasing-darkside-affiliates-identifying-threat-actors-connected-to-darkside-ransomware-using-maltego-intel-471-1/ - webarchive
- https://www.nytimes.com/2021/05/29/world/europe/ransomware-russia-darkside.html - webarchive
- https://therecord.media/darkside-ransomware-gang-moves-some-of-its-bitcoin-after-revil-got-hit-by-law-enforcement/ - webarchive
- https://abcnews.go.com/Politics/biden-speak-colonial-pipeline-attack-americans-face-gasoline/story?id=77666212 - webarchive
- https://www.digitalshadows.com/blog-and-research/ransomware-as-a-service-rogue-affiliates-and-whats-next/ - webarchive
- https://www.secureworks.com/blog/ransomware-groups-use-tor-based-backdoor-for-persistent-access - webarchive
- https://therecord.media/darkside-gang-estimated-to-have-made-over-90-million-from-ransomware-attacks/ - webarchive
- https://www.bleepingcomputer.com/news/security/popular-russian-hacking-forum-xss-bans-all-ransomware-topics/ - webarchive
- https://www.crowdstrike.com/blog/how-big-game-hunting-ttps-shifted-after-darkside-pipeline-attack/ - webarchive
- https://therecord.media/popular-hacking-forum-bans-ransomware-ads/ - webarchive
- https://www.elliptic.co/blog/darkside-bitcoins-on-the-move-following-government-cyberattack-against-revil-ransomware-group - webarchive
- https://www.crowdstrike.com/blog/how-to-defend-against-conti-darkside-revil-and-other-ransomware/ - webarchive
- https://www.ic3.gov/Media/News/2021/211101.pdf - webarchive
- https://www.bleepingcomputer.com/news/security/darkside-ransomware-rushes-to-cash-out-7-million-in-bitcoin/ - webarchive
- https://cybersecurity.att.com/blogs/labs-research/darkside-raas-in-linux-version - webarchive
- https://symantec.broadcom.com/hubfs/The_Ransomware_Threat_September_2021.pdf - webarchive
- https://otx.alienvault.com/pulse/60d0afbc395c24edefb33bb9 - webarchive
- https://medium.com/s2wlab/w1-jun-en-story-of-the-week-ransomware-on-the-darkweb-af491d33868b - webarchive
- https://www.bleepingcomputer.com/news/security/darkside-ransomware-servers-reportedly-seized-revil-restricts-targets/ - webarchive
- https://krebsonsecurity.com/2021/08/ransomware-gangs-and-the-name-game-distraction/ - webarchive
- https://www.databreaches.net/a-former-darkside-listing-shows-up-on-revils-leak-site/ - webarchive
- https://pylos.co/2021/05/13/mind-the-air-gap/ - webarchive
- https://www.youtube.com/watch?v=qxPXxWMI2i4 - webarchive
- https://therecord.media/darkside-ransomware-gang-says-it-lost-control-of-its-servers-money-a-day-after-biden-threat/ - webarchive
- https://www.crowdstrike.com/blog/falcon-protects-from-darkside-ransomware/ - webarchive
- https://www.elliptic.co/blog/elliptic-follows-bitcoin-ransoms-paid-by-darkside-ransomware-victims - webarchive
- https://securityscorecard.com/blog/new-evidence-supports-assessment-that-darkside-likely-responsible-for-colonial-pipeline-ransomware-attack-others-targeted - webarchive
- https://www.elliptic.co/blog/darkside-ransomware-has-netted-over-90-million-in-bitcoin - webarchive
- https://twitter.com/GelosSnake/status/1451465959894667275 - webarchive
- https://www.microsoft.com/security/blog/2022/05/09/ransomware-as-a-service-understanding-the-cybercrime-gig-economy-and-how-to-protect-yourself - webarchive
- https://blogs.blackberry.com/en/2021/09/threat-thursday-blackmatter-ransomware-as-a-service - webarchive
- https://www.technologyreview.com/2021/05/24/1025195/colonial-pipeline-ransomware-bitdefender/ - webarchive
- https://www.bleepingcomputer.com/news/security/darkside-ransomware-made-90-million-in-just-nine-months/ - webarchive
- https://www.crowdstrike.com/blog/how-ransomware-adversaries-reacted-to-the-darkside-pipeline-attack/ - webarchive
- https://krebsonsecurity.com/2021/05/darkside-ransomware-gang-quits-after-servers-bitcoin-stash-seized/ - webarchive
- https://blogs.vmware.com/security/2022/09/esxi-targeting-ransomware-the-threats-that-are-after-your-virtual-machines-part-1.html - webarchive
- https://www.crowdstrike.com/blog/carbon-spider-sprite-spider-target-esxi-servers-with-ransomware/ - webarchive
- https://www.crowdstrike.com/blog/carbon-spider-sprite-spider-target-esxi-servers-with-ransomware/?utm_campaign=blog&utm_medium=soc&utm_source=twtr&utm_content=sprout - webarchive
- https://twitter.com/JAMESWT_MHT/status/1388301138437578757 - webarchive
- https://www.youtube.com/watch?v=NIiEcOryLpI - webarchive
- https://blog.group-ib.com/blackmatter# - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
DarkRadiation
Internal MISP references
UUID 39be337b-8a9a-4d71-949b-5efd6248fc80
which can be used as unique global reference for DarkRadiation
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
DDG
First activity observed in October 2017. DDG is a botnet with P2P capability that is targeting crypto currency mining (Monero).
Internal MISP references
UUID 5c42585b-ea92-4fe2-8a79-bb47a3df67ad
which can be used as unique global reference for DDG
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.ddg - webarchive
- https://blog.netlab.360.com/ddg-mining-botnet-jin-qi-huo-dong-fen-xi/ - webarchive
- https://blog.netlab.360.com/ddg-a-mining-botnet-aiming-at-database-servers/ - webarchive
- https://blog.netlab.360.com/ddg-botnet-round-x-is-there-an-ending/ - webarchive
- https://blog.netlab.360.com/threat-alert-ddg-3013-is-out/ - webarchive
- https://blog.netlab.360.com/old-botnets-never-die-and-ddg-refuse-to-fade-away/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
ddoor
Internal MISP references
UUID 07f48866-647c-46b0-a0d4-29c81ad488a8
which can be used as unique global reference for ddoor
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
DEADBOLT
DEADBOLT is a linux ransomware written in Go, targeting QNAP NAS devices worldwide. The files are encrypted with AES128 encryption and will have the .deadbolt extension appended to file names.
Internal MISP references
UUID b37c9ba2-f1b0-4a2f-9387-7310939d2189
which can be used as unique global reference for DEADBOLT
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.deadbolt - webarchive
- https://www.trendmicro.com/en_us/research/22/f/closing-the-door-deadbolt-ransomware-locks-out-vendors-with-mult.html - webarchive
- https://community.riskiq.com/article/1601124b - webarchive
- https://securelist.com/new-ransomware-trends-in-2022/106457/ - webarchive
- https://www.bleepingcomputer.com/news/security/new-deadbolt-ransomware-targets-qnap-devices-asks-50-btc-for-master-key/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Decoy Dog RAT
Internal MISP references
UUID 6452720d-bd35-4c55-8178-ed0dd86f4c53
which can be used as unique global reference for Decoy Dog RAT
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Denonia
Cado discovered this malware, written in Go and targeting AWS Lambda environments.
Internal MISP references
UUID d5d9bb86-715d-4d86-a4d2-ab73085d1b0c
which can be used as unique global reference for Denonia
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Derusbi (ELF)
Internal MISP references
UUID 494dcdfb-88cb-456d-a95a-252ff10c0ba9
which can be used as unique global reference for Derusbi (ELF)
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
DISGOMOJI
Internal MISP references
UUID 1f6098a1-2395-4329-8865-49602638f45a
which can be used as unique global reference for DISGOMOJI
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Dofloo
Dofloo (aka AESDDoS) is a popular malware used to create large scale botnets that can launch DDoS attacks and load cryptocurrency miners to the infected machines.
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Dofloo.
Known Synonyms |
---|
AESDDoS |
Internal MISP references
UUID ffb5789f-d7e6-4723-a447-e5bb2fe713a0
which can be used as unique global reference for Dofloo
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Doki
Internal MISP references
UUID a5446b35-8613-4121-ada4-c0b1d6f72851
which can be used as unique global reference for Doki
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.doki - webarchive
- https://www.intezer.com/container-security/watch-your-containers-doki-infecting-docker-servers-in-the-cloud/ - webarchive
- https://www.securecoding.com/blog/all-about-doki-malware/ - webarchive
- https://www.intezer.com/blog/cloud-security/top-linux-cloud-threats-of-2020/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
DoubleFantasy (ELF)
Internal MISP references
UUID a41d8c89-8229-4936-96c2-4b194ebaf858
which can be used as unique global reference for DoubleFantasy (ELF)
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
DreamBus
Internal MISP references
UUID 22ff8eac-d92e-4c6e-829b-9b565d90eddd
which can be used as unique global reference for DreamBus
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Ebury
This payload has been used to compromise kernel.org back in August of 2011 and has hit cPanel Support which in turn, has infected quite a few cPanel servers. It is a credential stealing payload which steals SSH keys, passwords, and potentially other credentials.
This family is part of a wider range of tools which are described in detail in the operation windigo whitepaper by ESET.
Internal MISP references
UUID ce79265c-a467-4a17-b27d-7ec7954688d5
which can be used as unique global reference for Ebury
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.ebury - webarchive
- https://www.welivesecurity.com/2014/02/21/an-in-depth-analysis-of-linuxebury/ - webarchive
- https://security.web.cern.ch/security/advisories/windigo/windigo.shtml - webarchive
- https://www.welivesecurity.com/wp-content/uploads/2014/03/operation_windigo.pdf - webarchive
- https://www.welivesecurity.com/2014/10/15/operation-windigo-good-job-eset-says-malware-author/ - webarchive
- https://www.welivesecurity.com/2017/10/30/windigo-ebury-update-2/ - webarchive
- https://www.welivesecurity.com/2018/12/05/dark-side-of-the-forsshe/ - webarchive
- https://www.justice.gov/opa/pr/russian-citizen-pleads-guilty-involvement-global-botnet-conspiracy - webarchive
- https://www.welivesecurity.com/en/eset-research/ebury-alive-unseen-400k-linux-servers-compromised-cryptotheft-financial-gain/ - webarchive
- https://www.welivesecurity.com/wp-content/uploads/2018/12/ESET-The_Dark_Side_of_the_ForSSHe.pdf - webarchive
- https://csirt.gov.it/data/cms/posts/582/attachments/66ca2e9a-68cd-4df5-81a2-674c31a699c2/download - webarchive
- https://web-assets.esetstatic.com/wls/en/papers/white-papers/ebury-is-alive-but-unseen.pdf - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Echobot
The latest in this long line of Mirai scourges is a new variant named Echobot. Coming to life in mid-May, the malware was first described by Palo Alto Networks in a report published at the start of June, and then again in a report by security researchers from Akamai, in mid-June.
When it was first spotted by Palo Alto Networks researchers in early June, Echobot was using exploits for 18 vulnerabilities. In the Akamai report, a week later, Echobot was at 26.
https://www.zdnet.com/article/new-echobot-malware-is-a-smorgasbord-of-vulnerabilities
Internal MISP references
UUID 040ac9c6-e3ab-4b51-88a9-5380101c74f8
which can be used as unique global reference for Echobot
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.echobot - webarchive
- https://unit42.paloaltonetworks.com/new-mirai-variant-adds-8-new-exploits-targets-additional-iot-devices/ - webarchive
- https://www.bleepingcomputer.com/news/security/new-echobot-botnet-variant-uses-over-50-exploits-to-propagate/ - webarchive
- https://blogs.akamai.com/sitr/2019/06/latest-echobot-26-infection-vectors.html - webarchive
- https://www.f5.com/labs/articles/threat-intelligence/echobot-malware-now-up-to-71-exploits--targeting-scada - webarchive
- https://unit42.paloaltonetworks.com/mirai-variant-echobot-resurfaces-with-13-previously-unexploited-vulnerabilities/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Elevator
Internal MISP references
UUID 6ee05063-4f73-4a99-86a5-906164039a3a
which can be used as unique global reference for Elevator
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
EnemyBot
According to the Infosec Institute, EnemyBot is a dangerous IoT botnet that has made headlines in the last few weeks. This threat, which seems to be disseminated by the Keksec group, expanded its features by adding recent vulnerabilities discovered in 2022. It was designed to attack web servers, Android devices and content management systems (CMS) servers.
Internal MISP references
UUID 262d18be-7cab-46c2-bcb0-47fff17604aa
which can be used as unique global reference for EnemyBot
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.enemybot - webarchive
- https://www.fortinet.com/blog/threat-research/enemybot-a-look-into-keksecs-latest-ddos-botnet - webarchive
- https://www.securonix.com/blog/detecting-the-enemybot-botnet-advisory - webarchive
- https://www.securonix.com/blog/detecting-the-enemybot-botnet-advisory/ - webarchive
- https://cybersecurity.att.com/blogs/labs-research/rapidly-evolving-iot-malware-enemybot-now-targeting-content-management-system-servers - webarchive
- https://cybersecurity.att.com/blogs/labs-research/shikitega-new-stealthy-malware-targeting-linux - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Erebus (ELF)
Internal MISP references
UUID 479353aa-c6d7-47a7-b5f0-3f97fd904864
which can be used as unique global reference for Erebus (ELF)
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.erebus - webarchive
- https://www.vmware.com/content/dam/digitalmarketing/vmware/en/pdf/docs/vmw-exposing-malware-in-linux-based-multi-cloud-environments.pdf - webarchive
- https://blog.trendmicro.com/trendlabs-security-intelligence/erebus-resurfaces-as-linux-ransomware/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
ESXiArgs
Ransomware used to target ESXi servers.
Internal MISP references
UUID 7550af7f-91cc-49e7-a4c5-d4e4d993cbef
which can be used as unique global reference for ESXiArgs
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.esxi_args - webarchive
- https://blog.ovhcloud.com/ransomware-targeting-vmware-esxi/ - webarchive
- https://www.bleepingcomputer.com/news/security/massive-esxiargs-ransomware-attack-targets-vmware-esxi-servers-worldwide/ - webarchive
- https://www.youtube.com/watch?v=bBcvqxPdjoI - webarchive
- https://www.secuinfra.com/en/techtalk/hide-your-hypervisor-analysis-of-esxiargs-ransomware/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Evilginx
According to the author, Evilginx is a standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication.
Internal MISP references
UUID 8eee410f-0538-4a6c-897b-c6bf4f9f28d7
which can be used as unique global reference for Evilginx
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.evilginx - webarchive
- https://osamaellahi.medium.com/the-art-of-defense-evasion-part-3-bypass-multi-factor-authentication-mfa-26d3a87dea0f - webarchive
- https://github.com/kgretzky/evilginx2 - webarchive
- https://www.ironnet.com/blog/robin-banks-still-might-be-robbing-your-bank-part-2 - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
EvilGnome
According to Infosec Institute, EvilGnome presents itself to unwitting Linux users as a legitimate GNOME extension. Legitimate extensions help to extend Linux functionality, but instead of a healthy boost in system functionality, EvilGnome begins spying on users with an array of functionalities uncommon for most Linux malware types.
Internal MISP references
UUID 149e693c-4b51-4143-9061-6a8698b0e7f5
which can be used as unique global reference for EvilGnome
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.evilgnome - webarchive
- https://intezer.com/blog/linux/elf-malware-analysis-101-linux-threats-no-longer-an-afterthought - webarchive
- https://www.intezer.com/blog-evilgnome-rare-malware-spying-on-linux-desktop-users/ - webarchive
- https://ssu.gov.ua/uploads/files/DKIB/Technical%20report%20Armagedon.pdf - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
EwDoor
Internal MISP references
UUID e75eb723-7c23-4a3b-9419-cefb88e5f6b7
which can be used as unique global reference for EwDoor
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Exaramel (ELF)
Internal MISP references
UUID 1e0540f3-bad3-403f-b8ed-ce40a276559e
which can be used as unique global reference for Exaramel (ELF)
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.exaramel - webarchive
- https://www.welivesecurity.com/wp-content/uploads/2021/04/ESET_Industry_Report_Government.pdf - webarchive
- https://www.welivesecurity.com/2018/10/11/new-telebots-backdoor-linking-industroyer-notpetya/ - webarchive
- https://www.domaintools.com/resources/blog/centreon-to-exim-and-back-on-the-trail-of-sandworm - webarchive
- https://www.cert.ssi.gouv.fr/uploads/CERTFR-2021-CTI-005.pdf - webarchive
- https://www.wired.com/story/sandworm-centreon-russia-hack/ - webarchive
- https://pylos.co/wp-content/uploads/2020/02/Threat-Intelligence-and-the-Limits-of-Malware-Analysis.pdf - webarchive
- https://twitter.com/craiu/status/1361581668092493824 - webarchive
- https://attack.mitre.org/groups/G0034 - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
ext4
Internal MISP references
UUID 79b2b3c0-6119-4511-9c33-2a48532b6a60
which can be used as unique global reference for ext4
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Facefish
Internal MISP references
UUID 106487ea-a710-4546-bd62-bdbfa0b0447e
which can be used as unique global reference for Facefish
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
FBot
Internal MISP references
UUID 501e5434-5796-4d63-8539-d99ec48119c2
which can be used as unique global reference for FBot
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.fbot - webarchive
- https://blog.malwaremustdie.org/2020/01/mmd-0065-2020-linuxmirai-fbot.html - webarchive
- https://securitynews.sonicwall.com/xmlpost/vigilante-malware-removes-cryptominers-from-the-infected-device/ - webarchive
- https://blog.netlab.360.com/fbot-is-now-riding-the-traffic-and-transportation-smart-devices-en/ - webarchive
- https://blog.malwaremustdie.org/2020/02/mmd-0065-2021-linuxmirai-fbot-re.html - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
FinFisher (ELF)
Internal MISP references
UUID 44018d71-25fb-4959-b61e-d7af97c85131
which can be used as unique global reference for FinFisher (ELF)
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.finfisher - webarchive
- https://www.amnesty.org/en/latest/research/2020/09/german-made-finspy-spyware-found-in-egypt-and-mac-and-linux-versions-revealed/ - webarchive
- https://securelist.com/finspy-unseen-findings/104322/ - webarchive
- https://netzpolitik.org/2020/our-criminal-complaint-german-state-malware-company-finfisher-raided/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
floodor
Internal MISP references
UUID ac30f2be-8153-4588-b29c-5e5863792930
which can be used as unique global reference for floodor
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Fodcha
Malware used to run a DDoS botnet.
Internal MISP references
UUID 4a64a1ca-e5bc-4a27-bff2-1c68cea05ba7
which can be used as unique global reference for Fodcha
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
FontOnLake
This family utilizes custom modules allowing for remote access, credential harvesting (e.g. by modifying sshd) and proxy usage.
It comes with a rootkit as well.
Internal MISP references
UUID c530d62b-e49f-4ccf-9c87-d9f6c16617b7
which can be used as unique global reference for FontOnLake
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
FritzFrog
Guardicore has discovered FritzFrog, a sophisticated peer-to-peer (P2P) botnet which has been actively breaching SSH servers since January 2020. It is a worm which is written in Golang, and is modular, multi-threaded and fileless, leaving no trace on the infected machine’s disk.
Internal MISP references
UUID b43b7b4a-9cf4-4f98-b4d2-617a7d84bfa7
which can be used as unique global reference for FritzFrog
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.fritzfrog - webarchive
- https://www.guardicore.com/2020/08/fritzfrog-p2p-botnet-infects-ssh-servers/ - webarchive
- https://www.securityweek.com/sophisticated-fritzfrog-p2p-botnet-returns-after-long-break - webarchive
- https://www.akamai.com/blog/security/fritzfrog-a-new-generation-of-peer-to-peer-botnets - webarchive
- https://www.blackberry.com/content/dam/blackberry-com/asset/enterprise/pdf/direct/report-bb-2021-threat-report.pdf - webarchive
- https://www.intezer.com/blog/cloud-security/top-linux-cloud-threats-of-2020/ - webarchive
- https://blog.netlab.360.com/p2p-botnets-review-status-continuous-monitoring/ - webarchive
- https://www.akamai.com/blog/security/fritzfrog-p2p - webarchive
- https://www.cyberkendra.com/2024/02/fritzfrog-botnet-expands-attack-arsenal.html - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Gitpaste-12
Gitpaste-12 is a modular malware first observed in October 2020 targeting Linux based x86 servers, as well as Linux ARM and MIPS based IoT devices. It uses GitHub and Pastebin as dead drop C2 locations.
Internal MISP references
UUID ffd09324-b585-49c0-97e5-536d386f49a5
which can be used as unique global reference for Gitpaste-12
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Glupteba Proxy
ARM32 SOCKS proxy, written in Go, used in the Glupteba campaign.
Internal MISP references
UUID bcfec1d3-ff29-4677-a5f6-be285e98a9db
which can be used as unique global reference for Glupteba Proxy
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
GobRAT
Internal MISP references
UUID ddba032c-ebde-4736-b7ef-8376702dac6a
which can be used as unique global reference for GobRAT
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Godlua
Internal MISP references
UUID f3cb0a78-1608-44b1-9949-c6addf6c13ce
which can be used as unique global reference for Godlua
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Gomir
Internal MISP references
UUID 6fb012ce-c822-471c-9c15-4c7ecfb55528
which can be used as unique global reference for Gomir
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
GOSH
Internal MISP references
UUID 931f57f9-1edd-47b8-bf80-ae7190434558
which can be used as unique global reference for GOSH
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
GoTitan
GoTitan is a DDoS bot under development, which support ten different methods of launching distributed denial-of-service (DDoS) attacks: UDP, UDP HEX, TCP, TLS, RAW, HTTP GET, HTTP POST, HTTP HEAD, and HTTP PUT.
Internal MISP references
UUID 92007a5e-d408-4c95-b4c2-7b4e4e29559e
which can be used as unique global reference for GoTitan
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
GreedyAntd
Internal MISP references
UUID 6aee7daf-9f63-4a70-bfe5-9c95cbdcb1e3
which can be used as unique global reference for GreedyAntd
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Gwisin (ELF)
Internal MISP references
UUID c02d252d-95cc-45bc-adb6-bae51b16c55b
which can be used as unique global reference for Gwisin (ELF)
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
HabitsRAT (ELF)
Internal MISP references
UUID e87e7f26-f2a1-437f-8650-312050e3cd48
which can be used as unique global reference for HabitsRAT (ELF)
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Hadooken
Internal MISP references
UUID 84e9e1ec-3676-4d64-9134-c48221c03e38
which can be used as unique global reference for Hadooken
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Haiduc
Internal MISP references
UUID dd85732f-cbf8-4f2c-af5c-f51ef7d99b6a
which can be used as unique global reference for Haiduc
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Hajime
Internal MISP references
UUID ff8ee85f-4175-4f5a-99e5-0cbc378f1489
which can be used as unique global reference for Hajime
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.hajime - webarchive
- https://x86.re/blog/hajime-a-follow-up/ - webarchive
- https://blog.netlab.360.com/quick-summary-port-8291-scan-en/ - webarchive
- https://github.com/Psychotropos/hajime_hashes - webarchive
- https://security.radware.com/WorkArea/DownloadAsset.aspx?id=1461 - webarchive
- https://par.nsf.gov/servlets/purl/10096257 - webarchive
- https://www.symantec.com/connect/blogs/hajime-worm-battles-mirai-control-internet-things - webarchive
- https://blog.netlab.360.com/p2p-botnets-review-status-continuous-monitoring/ - webarchive
- http://blog.netlab.360.com/hajime-status-report-en/ - webarchive
- https://security.rapiditynetworks.com/publications/2016-10-16/hajime.pdf - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Hakai
Internal MISP references
UUID 0839c28a-ea11-44d4-93d1-24b246ef6743
which can be used as unique global reference for Hakai
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
HandyMannyPot
Internal MISP references
UUID 0b323b91-ad57-4127-99d1-6a2485be70df
which can be used as unique global reference for HandyMannyPot
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Hand of Thief
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Hand of Thief.
Known Synonyms |
---|
Hanthie |
Internal MISP references
UUID db3e17f0-677b-4bdb-bc26-25e62a74673d
which can be used as unique global reference for Hand of Thief
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.hand_of_thief - webarchive
- https://blog.avast.com/2013/08/27/linux-trojan-hand-of-thief-ungloved/ - webarchive
- https://web.archive.org/web/20130815040638/https://blogs.rsa.com/thieves-reaching-for-linux-hand-of-thief-trojan-targets-linux-inth3wild/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
HeadCrab
Internal MISP references
UUID 7bb684d8-ad5c-4d01-91eb-2c600dbcda2a
which can be used as unique global reference for HeadCrab
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
HellDown
Ransomware.
Internal MISP references
UUID 6dd0e6e4-536b-4271-a948-39282ff48940
which can be used as unique global reference for HellDown
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
HelloBot (ELF)
Internal MISP references
UUID b9fec670-2b1e-4287-ac93-68360d5adcf4
which can be used as unique global reference for HelloBot (ELF)
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
HelloKitty (ELF)
Linux version of the HelloKitty ransomware.
Internal MISP references
UUID 785cadf7-5c99-40bc-b718-8a98d9aa90b7
which can be used as unique global reference for HelloKitty (ELF)
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.hellokitty - webarchive
- https://www.microsoft.com/security/blog/2022/05/09/ransomware-as-a-service-understanding-the-cybercrime-gig-economy-and-how-to-protect-yourself - webarchive
- https://unit42.paloaltonetworks.com/emerging-ransomware-groups/ - webarchive
- https://www.vmware.com/content/dam/digitalmarketing/vmware/en/pdf/docs/vmw-exposing-malware-in-linux-based-multi-cloud-environments.pdf - webarchive
- https://blog.sekoia.io/vice-society-a-discreet-but-steady-double-extortion-ransomware-group - webarchive
- https://www.bleepingcomputer.com/news/security/linux-version-of-hellokitty-ransomware-targets-vmware-esxi-servers/ - webarchive
- https://www.crowdstrike.com/blog/hypervisor-jackpotting-ecrime-actors-increase-targeting-of-esxi-servers/ - webarchive
- https://soolidsnake.github.io/2021/07/17/hellokitty_linux.html - webarchive
- https://blogs.vmware.com/security/2022/09/esxi-targeting-ransomware-the-threats-that-are-after-your-virtual-machines-part-1.html - webarchive
- https://blog.sekoia.io/vice-society-a-discreet-but-steady-double-extortion-ransomware-group/ - webarchive
- https://www.esentire.com/blog/conti-affiliate-exposed-new-domain-names-ip-addresses-and-email-addresses-uncovered-by-esentire - webarchive
- https://www.govinfosecurity.com/vice-society-ransomware-gang-disrupted-spar-stores-a-18225 - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
HiatusRAT
Lumen discovered this malware used in campaign targeting business-grade routers using a RAT they call HiatusRAT and a variant of tcpdump for traffic interception.
Internal MISP references
UUID 69dcee87-dc61-48d4-a6af-177396bdb850
which can be used as unique global reference for HiatusRAT
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
HiddenWasp
HiddenWasp is a Linux-based Trojan used to target systems for remote control. It comes in the form of a statically linked ELF binary with stdlibc++.
Internal MISP references
UUID ae00d48d-c515-4ca9-a29c-8c53a78f8c73
which can be used as unique global reference for HiddenWasp
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.hiddenwasp - webarchive
- https://intezer.com/blog/linux/elf-malware-analysis-101-linux-threats-no-longer-an-afterthought - webarchive
- https://www.intezer.com/blog/incident-response/orbit-new-undetected-linux-threat/ - webarchive
- https://www.intezer.com/blog-hiddenwasp-malware-targeting-linux-systems/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Hide and Seek
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Hide and Seek.
Known Synonyms |
---|
HNS |
Internal MISP references
UUID 41bf8f3e-bb6a-445d-bb74-d08aae61a94b
which can be used as unique global reference for Hide and Seek
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.hideandseek - webarchive
- https://blog.avast.com/hide-n-seek-botnet-continues - webarchive
- https://labs.bitdefender.com/2018/01/new-hide-n-seek-iot-botnet-using-custom-built-peer-to-peer-communication-spotted-in-the-wild/ - webarchive
- https://www.bleepingcomputer.com/news/security/new-hns-iot-botnet-has-already-amassed-14k-bots/ - webarchive
- https://www.bleepingcomputer.com/news/security/hns-evolves-from-iot-to-cross-platform-botnet/ - webarchive
- https://www.fortinet.com/blog/threat-research/searching-for-the-reuse-of-mirai-code--hide--n-seek-bot.html - webarchive
- https://threatlabs.avast.com/botnet - webarchive
- https://labs.bitdefender.com/2018/05/hide-and-seek-iot-botnet-resurfaces-with-new-tricks-persistence/ - webarchive
- https://www.bleepingcomputer.com/news/security/hide-and-seek-becomes-first-iot-botnet-capable-of-surviving-device-reboots/ - webarchive
- https://unit42.paloaltonetworks.com/hide-n-seek-botnet-updates-arsenal-with-exploits-against-nexus-repository-manager-thinkphp/ - webarchive
- https://blog.netlab.360.com/hns-botnet-recent-activities-en/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
HinataBot
HinataBot is a Go-based DDoS-focused botnet. It was observed in the first quarter of 2023 targeting HTTP and SSH endpoints leveraging old vulnerabilities and weak credentials. Amongst those infection vectors are exploitation of the miniigd SOAP service on Realtek SDK devices (CVE-2014-8361), Huawei HG532 routers (CVE-2017-17215), and exposed Hadoop YARN servers.
Internal MISP references
UUID b10fc382-b740-417a-98fa-e23d10223958
which can be used as unique global reference for HinataBot
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Hipid
Internal MISP references
UUID d55eb2f1-e24d-4b50-9839-2e53b5059bae
which can be used as unique global reference for Hipid
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Hive (ELF)
Internal MISP references
UUID c22452c8-c818-4577-9737-0b87342c7913
which can be used as unique global reference for Hive (ELF)
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.hive - webarchive
- https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RE54L7v - webarchive
- https://securityaffairs.co/wordpress/128232/security/recover-files-hive-ransomware.html - webarchive
- https://arxiv.org/pdf/2202.08477.pdf - webarchive
- https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2022/06/23093553/Common-TTPs-of-the-modern-ransomware_low-res.pdf - webarchive
- https://twitter.com/malwrhunterteam/status/1455628865229950979 - webarchive
- https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-april-1st-2022-i-can-fight-with-a-keyboard/ - webarchive
- https://www.trendmicro.com/vinfo/us/security/news/ransomware-spotlight/ransomware-spotlight-hive - webarchive
- https://therecord.media/hive-ransomware-shuts-down-california-health-care-organization/ - webarchive
- https://thehackernews.com/2022/02/master-key-for-hive-ransomware.html - webarchive
- https://yoroi.company/research/on-the-footsteps-of-hive-ransomware/ - webarchive
- https://www.threatstop.com/blog/first-conti-then-hive-costa-rica-gets-hit-with-ransomware-again - webarchive
- https://github.com/reecdeep/HiveV5_file_decryptor - webarchive
- https://therecord.media/academics-publish-method-for-recovering-data-encrypted-by-the-hive-ransomware/ - webarchive
- https://www.microsoft.com/security/blog/2022/05/09/ransomware-as-a-service-understanding-the-cybercrime-gig-economy-and-how-to-protect-yourself - webarchive
- https://github.com/rivitna/Malware/tree/main/Hive - webarchive
- https://twitter.com/ESETresearch/status/1454100591261667329 - webarchive
- https://lifars.com/2022/02/how-to-decrypt-the-files-encrypted-by-the-hive-ransomware/ - webarchive
- https://www.bleepingcomputer.com/news/security/hive-ransomware-ports-its-linux-vmware-esxi-encryptor-to-rust/ - webarchive
- https://yoroi.company/wp-content/uploads/2022/07/Yoroi-On-The-Footsteps-of-Hive-Ransomware.pdf - webarchive
- https://krebsonsecurity.com/2023/05/russian-hacker-wazawaka-indicted-for-ransomware/ - webarchive
- https://blogs.vmware.com/security/2022/09/esxi-targeting-ransomware-the-threats-that-are-after-your-virtual-machines-part-1.html - webarchive
- https://blog.group-ib.com/hive - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Horse Shell
Checkpoint Research describes this as part of a custom firmware image affiliated with the Chinese state-sponsored actor “Camaro Dragon”, a custom MIPS32 ELF implant. HorseShell, the main implant inserted into the modified firmware by the attackers, provides the attacker with 3 main functionalities: * Remote shell: Execution of arbitrary shell commands on the infected router * File transfer: Upload and download files to and from the infected router. * SOCKS tunneling: Relay communication between different clients.
Internal MISP references
UUID 9d04d96a-92fd-4731-a3b5-a3fdafd3e523
which can be used as unique global reference for Horse Shell
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Hubnr
Internal MISP references
UUID c55389b0-e778-4cf9-9030-3d1efc1224c9
which can be used as unique global reference for Hubnr
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
HyperSSL (ELF)
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular HyperSSL (ELF).
Known Synonyms |
---|
SysUpdate |
Internal MISP references
UUID 263aaef5-9758-49f1-aff1-9a509f545bb3
which can be used as unique global reference for HyperSSL (ELF)
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
iceFire
Internal MISP references
UUID c03b2f7f-31ed-4133-b947-4b8846d90f19
which can be used as unique global reference for iceFire
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Icnanker
Internal MISP references
UUID cd9f128b-6502-4e1b-a5b3-25f3c7f01ca3
which can be used as unique global reference for Icnanker
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
INC
Internal MISP references
UUID fa3f90a3-40e3-4636-90f9-3e02bf645afd
which can be used as unique global reference for INC
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.inc - webarchive
- https://twitter.com/malwrhunterteam/status/1689029459255373826 - webarchive
- https://cisoseries.com/cybersecurity-news-inc-targets-healthcare-providence-schools-cyberattack-apple-ipads-bricked/ - webarchive
- https://nikhilh-20.github.io/blog/inc_ransomware/ - webarchive
- https://x.com/MsftSecIntel/status/1836456406276342215 - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
IoT Reaper
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular IoT Reaper.
Known Synonyms |
---|
IoTroop |
Reaper |
iotreaper |
Internal MISP references
UUID 37c357a1-ec09-449f-b5a9-c1ef1fba2de2
which can be used as unique global reference for IoT Reaper
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.iot_reaper - webarchive
- https://research.checkpoint.com/new-iot-botnet-storm-coming/ - webarchive
- http://blog.netlab.360.com/iot_reaper-a-rappid-spreading-new-iot-botnet-en/ - webarchive
- https://krebsonsecurity.com/2017/10/reaper-calm-before-the-iot-security-storm - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
IPStorm (ELF)
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular IPStorm (ELF).
Known Synonyms |
---|
InterPlanetary Storm |
Internal MISP references
UUID a24f9c4b-1fa7-4da2-9929-064345389e67
which can be used as unique global reference for IPStorm (ELF)
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.ipstorm - webarchive
- https://maldbg.com/ipstorm-golang-malware-windows - webarchive
- https://www.anomali.com/blog/the-interplanetary-storm-new-malware-in-wild-using-interplanetary-file-systems-ipfs-p2p-network - webarchive
- https://www.blackberry.com/content/dam/blackberry-com/asset/enterprise/pdf/direct/report-bb-2021-threat-report.pdf - webarchive
- https://www.intezer.com/blog/research/a-storm-is-brewing-ipstorm-now-has-linux-malware/ - webarchive
- https://www.justice.gov/usao-pr/pr/russian-and-moldovan-national-pleads-guilty-operating-illegal-botnet-proxy-service - webarchive
- https://www.bitdefender.com/files/News/CaseStudies/study/376/Bitdefender-Whitepaper-IPStorm.pdf - webarchive
- https://www.intezer.com/blog/cloud-security/top-linux-cloud-threats-of-2020/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
IZ1H9
ccording to Fortinet, this is a Mirai-based DDoS botnet.
Internal MISP references
UUID 6e98a149-9ce2-4750-9680-69f3ced5f33e
which can be used as unique global reference for IZ1H9
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
JenX
Internal MISP references
UUID 6a4365fc-8448-4270-ba93-0341788d004b
which can be used as unique global reference for JenX
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Kaden
Kaden is a DDoS botnet that is heavily based on Bashlite/Gafgyt. Next to DDoS capabilities it contains wiper functionality, which currently can not be triggerred (yet).
Internal MISP references
UUID eebd19b4-6671-4b17-be6a-cc467e5869a5
which can be used as unique global reference for Kaden
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Kaiji
Surfaced in late April 2020, Intezer describes Kaiji as a DDoS malware written in Go that spreads through SSH brute force attacks. Recovered function names are an English representation of Chinese words, hinting about the origin. The name Kaiji was given by MalwareMustDie based on strings found in samples.
Internal MISP references
UUID 33fe7943-c1b3-48d5-b287-126390b091f0
which can be used as unique global reference for Kaiji
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.kaiji - webarchive
- https://www.bitdefender.com/box/blog/iot-news/kaiji-new-strain-iot-malware-seizing-control-launching-ddos-attacks/ - webarchive
- https://blog.lumen.com/chaos-is-a-go-based-swiss-army-knife-of-malware/ - webarchive
- https://blog.trendmicro.com/trendlabs-security-intelligence/xorddos-kaiji-botnet-malware-variants-target-exposed-docker-servers/ - webarchive
- https://intezer.com/blog/research/kaiji-new-chinese-linux-malware-turning-to-golang/ - webarchive
- https://www.ibm.com/downloads/cas/WMDZOWK6?social_post=5483919673&linkId=131648775 - webarchive
- https://www.intezer.com/blog/cloud-security/top-linux-cloud-threats-of-2020/ - webarchive
- https://www.elastic.co/security-labs/betting-on-bots - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Kaiten
According to netenrich, Kaiten is a Trojan horse that opens a back door on the compromised computer that allows it to perform other malicious activities. The trojan does not create any copies of itself. This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Kaiten.
Known Synonyms |
---|
STD |
Internal MISP references
UUID 9b618703-58f6-4f0b-83a4-d4f13e2e5d12
which can be used as unique global reference for Kaiten
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.kaiten - webarchive
- https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/apache-log4j-zero-day - webarchive
- https://www.akamai.com/us/en/multimedia/documents/state-of-the-internet/kaiten-std-router-ddos-malware-threat-advisory.pdf - webarchive
- https://www.blackarrow.net/attackers-abuse-mobileirons-rce-to-deliver-kaiten/ - webarchive
- https://www.trendmicro.com/en_us/research/20/i/exposed-docker-server-abused-to-drop-cryptominer-ddos-bot-.html - webarchive
- https://www.lacework.com/blog/the-kek-security-network/ - webarchive
- https://www.lacework.com/the-kek-security-network/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
kerberods
Internal MISP references
UUID e3787d95-2595-449e-8cf9-90845a9b7444
which can be used as unique global reference for kerberods
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.kerberods - webarchive
- https://blog.trendmicro.com/trendlabs-security-intelligence/cve-2019-3396-redux-confluence-vulnerability-exploited-to-deliver-cryptocurrency-miner-with-rootkit/ - webarchive
- https://www.fortinet.com/blog/threat-research/rocke-variant-ready-to-box-mining-challengers.html - webarchive
- https://www.anomali.com/blog/rocke-evolves-its-arsenal-with-a-new-malware-family-written-in-golang - webarchive
- https://isc.sans.edu/forums/diary/Vulnerable+Apache+Jenkins+exploited+in+the+wild/24916 - webarchive
- https://blog.talosintelligence.com/2019/09/watchbog-patching.html - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
KEYPLUG
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular KEYPLUG.
Known Synonyms |
---|
ELFSHELF |
Internal MISP references
UUID 2c4bfc14-3ea4-4ced-806a-fcac30b2a9d7
which can be used as unique global reference for KEYPLUG
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.keyplug - webarchive
- https://go.recordedfuture.com/hubfs/reports/cta-2023-0330.pdf - webarchive
- https://www.mandiant.com/resources/mobileiron-log4shell-exploitation - webarchive
- https://i.blackhat.com/Asia-22/Thursday-Materials/AS-22-LeonSilvia-NextGenPlugXShadowPad.pdf - webarchive
- https://twitter.com/CyberJack42/status/1501290277864046595 - webarchive
- https://experience.mandiant.com/trending-evil/p/1 - webarchive
- https://www.sentinelone.com/labs/sandman-apt-china-based-adversaries-embrace-lua/ - webarchive
- https://web.archive.org/web/20240523105313/https://yoroi.company/en/research/uncovering-an-undetected-keyplug-implant-attacking-industries-in-italy/ - webarchive
- https://www.mandiant.com/resources/apt41-us-state-governments - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
kfos
Internal MISP references
UUID 5e353bc2-4d32-409b-aeb6-c7df32607c56
which can be used as unique global reference for kfos
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Kinsing
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Kinsing.
Known Synonyms |
---|
h2miner |
Internal MISP references
UUID ef0e3a56-e614-4dc1-bb20-0dcf7215c1ea
which can be used as unique global reference for Kinsing
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.kinsing - webarchive
- https://www.vmware.com/content/dam/digitalmarketing/vmware/en/pdf/docs/vmw-exposing-malware-in-linux-based-multi-cloud-environments.pdf - webarchive
- https://www.cadosecurity.com/analysis-of-initial-in-the-wild-attacks-exploiting-log4shell-log4j-cve-2021-44228/ - webarchive
- https://www.cyberark.com/resources/threat-research-blog/kinsing-the-malware-with-two-faces - webarchive
- https://www.aquasec.com/blog/loony-tunables-vulnerability-exploited-by-kinsing/ - webarchive
- https://sysdig.com/blog/zoom-into-kinsing-kdevtmpfsi/ - webarchive
- https://www.trendmicro.com/en_us/research/20/k/analysis-of-kinsing-malwares-use-of-rootkit.html - webarchive
- https://www.trendmicro.com/en_us/research/21/g/threat-actors-exploit-misconfigured-apache-hadoop-yarn.html - webarchive
- https://medium.com/s2wblog/logs-of-log4shell-cve-2021-44228-log4j-is-ubiquitous-en-809064312039 - webarchive
- https://www.lacework.com/blog/kinsing-dark-iot-botnet-among-threats-targeting-cve-2022-26134/ - webarchive
- https://redcanary.com/blog/kinsing-malware-citrix-saltstack/ - webarchive
- https://www.aquasec.com/blog/aqua-cndr-stop-dreambus-botnet-attack/ - webarchive
- https://www.intezer.com/blog/cloud-security/top-linux-cloud-threats-of-2020/ - webarchive
- https://1665891.fs1.hubspotusercontent-na1.net/hubfs/1665891/Threat%20reports/AquaSecurity_Kinsing_Demystified_Technical_Guide.pdf - webarchive
- https://www.alibabacloud.com/blog/new-outbreak-of-h2miner-worms-exploiting-redis-rce-detected_595743 - webarchive
- https://www.aquasec.com/blog/kinsing-malware-exploits-novel-openfire-vulnerability/ - webarchive
- https://blog.aquasec.com/threat-alert-kinsing-malware-container-vulnerability - webarchive
- https://www.trendmicro.com/en_us/research/22/i/a-post-exploitation-look-at-coinminers-abusing-weblogic-vulnerab.html - webarchive
- https://unit42.paloaltonetworks.com/atoms/moneylibra/ - webarchive
- https://www.zscaler.com/blogs/security-research/threatlabz-analysis-log4shell-cve-2021-44228-exploit-attempts - webarchive
- https://www.bleepingcomputer.com/news/security/log4shell-exploits-now-used-mostly-for-ddos-botnets-cryptominers/ - webarchive
- https://www.ibm.com/downloads/cas/WMDZOWK6?social_post=5483919673&linkId=131648775 - webarchive
- https://twitter.com/IntezerLabs/status/1259818964848386048 - webarchive
- https://twitter.com/MsftSecIntel/status/1535417776290111489 - webarchive
- https://unit42.paloaltonetworks.com/cve-2020-25213/ - webarchive
- https://blog.aquasec.com/kinsing-malware-exploits-novel-openfire-vulnerability - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
KIVARS (ELF)
Internal MISP references
UUID e8b24118-4ce8-471b-8683-1077a0f5f2a9
which can be used as unique global reference for KIVARS (ELF)
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Kobalos
Internal MISP references
UUID 201d54ae-7fb0-4522-888c-758fa9019737
which can be used as unique global reference for Kobalos
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.kobalos - webarchive
- https://team-cymru.com/blog/2021/02/05/kobalos-malware-mapping/ - webarchive
- https://www.welivesecurity.com/wp-content/uploads/2021/01/ESET_Kobalos.pdf - webarchive
- https://www.welivesecurity.com/2021/02/02/kobalos-complex-linux-threat-high-performance-computing-infrastructure/ - webarchive
- https://www.welivesecurity.com/wp-content/uploads/2021/05/eset_threat_report_t12021.pdf - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Krasue RAT
Internal MISP references
UUID b111325d-dd90-47cc-8777-fcb7e610a76e
which can be used as unique global reference for Krasue RAT
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
KrustyLoader
ELF x64 Rust downloader first discovered on Ivanti Connect Secure VPN after the exploitation of CVE-2024-21887 and CVE-2023-46805. Downloads Sliver backdoor and deletes itself.
Internal MISP references
UUID 1a5d8c38-42fa-4405-83fc-4e07b4407205
which can be used as unique global reference for KrustyLoader
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
KTLVdoor (ELF)
According to Trend Micro, KTLVdoor is a highly obfuscated malware that masquerades as different system utilities, allowing attackers to carry out a variety of tasks including file manipulation, command execution, and remote port scanning.
Internal MISP references
UUID 3ee0b08d-b872-4eda-8f8f-6d2f37b053ae
which can be used as unique global reference for KTLVdoor (ELF)
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Kuiper (ELF)
Internal MISP references
UUID 30ad3f49-bffd-4383-88b3-067ccfac7038
which can be used as unique global reference for Kuiper (ELF)
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Lady
Internal MISP references
UUID f8b91c34-b4f0-4ef2-b9fb-15bd5ec0a66d
which can be used as unique global reference for Lady
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
LeetHozer
Internal MISP references
UUID e9f2857a-cb91-4715-ac8b-fdc89bc9a03e
which can be used as unique global reference for LeetHozer
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Lightning Framework
Internal MISP references
UUID 927bc8fc-fef4-4331-877d-18bcd33bdf9c
which can be used as unique global reference for Lightning Framework
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
LiLock
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular LiLock.
Known Synonyms |
---|
Lilocked |
Lilu |
Internal MISP references
UUID 1328ed0d-9c1c-418b-9a96-1c538e4893bc
which can be used as unique global reference for LiLock
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.lilock - webarchive
- https://www.bleepingcomputer.com/news/security/lilocked-ransomware-actively-targeting-servers-and-web-sites/ - webarchive
- https://id-ransomware.blogspot.com/2019/07/lilu-lilocked-ransomware.html - webarchive
- https://fossbytes.com/lilocked-ransomware-infected-linux-servers/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
lilyofthevalley
Internal MISP references
UUID f789442f-8f50-4e55-8fbc-b93d22b5314e
which can be used as unique global reference for lilyofthevalley
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Linodas
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Linodas.
Known Synonyms |
---|
DinodasRAT |
XDealer |
Internal MISP references
UUID e47295eb-e907-410a-ab16-62ed8652d8bf
which can be used as unique global reference for Linodas
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
LiquorBot
BitDefender tracked the development of a Mirai-inspired botnet, dubbed LiquorBot, which seems to be actively in development and has recently incorporated Monero cryptocurrency mining features. Interestingly, LiquorBot is written in Go (also known as Golang), which offers some programming advantages over traditional C-style code, such as memory safety, garbage collection, structural typing, and even CSP-style concurrency.
Internal MISP references
UUID 3fe8f3db-4861-4e78-8b60-a794fe22ae3f
which can be used as unique global reference for LiquorBot
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
LockBit (ELF)
Internal MISP references
UUID afce6aba-d4c4-49fa-b9a9-1a70e92e5a0e
which can be used as unique global reference for LockBit (ELF)
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.lockbit - webarchive
- https://analyst1.com/ransomware-diaries-volume-1/ - webarchive
- https://nationalcrimeagency.gov.uk/news/nca-leads-international-investigation-targeting-worlds-most-harmful-ransomware-group - webarchive
- https://www.ic3.gov/Media/News/2022/220204.pdf - webarchive
- https://noticeofpleadings.com/crackedcobaltstrike/files/ComplaintAndSummons/1%20-Microsoft%20Cobalt%20Strike%20-%20Complaint(907040021.9).pdf - webarchive
- https://www.trellix.com/en-us/about/newsroom/stories/threat-labs/conti-leaks-examining-the-panama-papers-of-ransomware.html - webarchive
- https://medium.com/@lcam/lighting-the-exfiltration-infrastructure-of-a-lockbit-affiliate-and-more-f57fbb7a4e79 - webarchive
- https://analyst1.com/ransomware-diaries-volume-3-lockbits-secrets/ - webarchive
- https://github.com/prodaft/malware-ioc/tree/master/PTI-257 - webarchive
- https://www.trendmicro.com/en_us/research/22/a/analysis-and-Impact-of-lockbit-ransomwares-first-linux-and-vmware-esxi-variant.html - webarchive
- https://www.washingtonpost.com/business/2024/02/20/lockbit-ransomware-cronos-nca-fbi/ - webarchive
- https://www.bleepingcomputer.com/news/security/lockbit-victim-estimates-cost-of-ransomware-attack-to-be-42-million/ - webarchive
- https://www.europol.europa.eu/media-press/newsroom/news/law-enforcement-disrupt-worlds-biggest-ransomware-operation - webarchive
- https://securelist.com/crimeware-report-lockbit-switchsymb/110068/ - webarchive
- https://blog.compass-security.com/2022/03/vpn-appliance-forensics/ - webarchive
- https://blog.talosintelligence.com/talos-ir-q2-2023-quarterly-recap/ - webarchive
- https://www.dragos.com/blog/industry-news/dragos-ics-ot-ransomware-analysis-q4-2021/ - webarchive
- https://analyst1.com/lockbit-takedown-operation-cronos-a-long-awaited-psyops-against-ransomware/ - webarchive
- https://www.microsoft.com/security/blog/2022/05/09/ransomware-as-a-service-understanding-the-cybercrime-gig-economy-and-how-to-protect-yourself - webarchive
- https://lifars.com/wp-content/uploads/2022/02/LockBitRansomware_Whitepaper.pdf - webarchive
- https://socradar.io/lockbit-3-another-upgrade-to-worlds-most-active-ransomware/ - webarchive
- https://krebsonsecurity.com/2023/05/russian-hacker-wazawaka-indicted-for-ransomware/ - webarchive
- https://blogs.vmware.com/security/2022/09/esxi-targeting-ransomware-the-threats-that-are-after-your-virtual-machines-part-1.html - webarchive
- https://security.packt.com/understanding-lockbit/ - webarchive
- https://www.fortinet.com/blog/threat-research/ransomware-roundup-new-variants - webarchive
- https://www.crowdstrike.com/blog/better-together-global-attitude-survey-takeaways-2021/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Loerbas
Loader and Cleaner components used in attacks against high-performance computing centers in Europe.
Internal MISP references
UUID 6332d57c-c46f-4907-8dac-965b15ffbed6
which can be used as unique global reference for Loerbas
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Log Collector
Internal MISP references
UUID 0473214a-2daa-4b5b-84bc-1bcbab11ef80
which can be used as unique global reference for Log Collector
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Lootwodniw
Internal MISP references
UUID cfcf8608-03e7-4a5b-a46c-af342db2d540
which can be used as unique global reference for Lootwodniw
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Luna
ESXi encrypting ransomware written in Rust.
Internal MISP references
UUID bc9022d6-ee65-463f-9823-bc0f96963a75
which can be used as unique global reference for Luna
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Manjusaka (ELF)
Cisco Talos compared this RAT to Cobalt Strike and Sliver. Written in Rust.
Internal MISP references
UUID cd3a3a96-af66-4470-8115-b8bf3eef005a
which can be used as unique global reference for Manjusaka (ELF)
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Masuta
Masuta takes advantage of the EDB 38722 D-Link exploit.
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Masuta.
Known Synonyms |
---|
PureMasuta |
Internal MISP references
UUID b9168ff8-01df-4cd0-9f70-fe9e7a11eccd
which can be used as unique global reference for Masuta
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.masuta - webarchive
- https://blog.newskysecurity.com/masuta-satori-creators-second-botnet-weaponizes-a-new-router-exploit-2ddc51cc52a7 - webarchive
- https://www.virusbulletin.com/virusbulletin/2018/12/vb2018-paper-tracking-mirai-variants/#h2-appendix-sample-sha256-hashes - webarchive
- https://threatpost.com/satori-author-linked-to-new-mirai-variant-masuta/129640/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Matryosh
Internal MISP references
UUID 4e989704-c49f-468c-95e1-1b7c5a58b3c4
which can be used as unique global reference for Matryosh
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Melofee
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Melofee.
Known Synonyms |
---|
Mélofée |
Internal MISP references
UUID 1ffd85bd-389c-4e04-88fd-8186423c3691
which can be used as unique global reference for Melofee
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
MESSAGETAP
MESSAGETAP is a 64-bit ELF data miner initially loaded by an installation script. It is designed to monitor and save SMS traffic from specific phone numbers, IMSI numbers and keywords for subsequent theft.
Internal MISP references
UUID a07d6748-3557-41ac-b55b-f4348dc2a3c7
which can be used as unique global reference for MESSAGETAP
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.messagetap - webarchive
- https://securelist.com/an-overview-of-targeted-attacks-and-apts-on-linux/98440/ - webarchive
- https://www.fireeye.com/blog/threat-research/2019/10/messagetap-who-is-reading-your-text-messages.html - webarchive
- https://attack.mitre.org/groups/G0096 - webarchive
- https://www.pwc.co.uk/cyber-security/assets/cyber-threats-2019-retrospect.pdf - webarchive
- https://intezer.com/blog/linux/elf-malware-analysis-101-linux-threats-no-longer-an-afterthought - webarchive
- https://summit.fireeye.com/content/dam/fireeye-www/summit/cds-2019/presentations/cds19-executive-s08-achievement-unlocked.pdf - webarchive
- https://go.crowdstrike.com/rs/281-OBQ-266/images/Report2020CrowdStrikeGlobalThreatReport.pdf - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Midrashim
A x64 ELF file infector with non-destructive payload.
Internal MISP references
UUID fe220358-7118-4feb-b43e-cbdaf2ea09dc
which can be used as unique global reference for Midrashim
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
MiKey
Internal MISP references
UUID aae3b83d-a116-4ebc-aae0-f6327ef174ea
which can be used as unique global reference for MiKey
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Mirai (ELF)
Mirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world.
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Mirai (ELF).
Known Synonyms |
---|
Katana |
Internal MISP references
UUID 17e12216-a303-4a00-8283-d3fe92d0934c
which can be used as unique global reference for Mirai (ELF)
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.mirai - webarchive
- https://www.trendmicro.com/en_us/research/22/d/cve-2022-22965-analyzing-the-exploitation-of-spring4shell-vulner.html - webarchive
- https://unit42.paloaltonetworks.com/cve-2021-32305-websvn/ - webarchive
- https://www.cadosecurity.com/analysis-of-initial-in-the-wild-attacks-exploiting-log4shell-log4j-cve-2021-44228/ - webarchive
- https://blog.trendmicro.com/trendlabs-security-intelligence/with-mirai-comes-miori-iot-botnet-delivered-via-thinkphp-remote-code-execution-exploit/ - webarchive
- https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/tough-times-for-ukrainian-honeypot - webarchive
- https://www.netscout.com/blog/asert/ddos-attack-campaign-targeting-multiple-organizations-ukraine - webarchive
- https://www.blackberry.com/content/dam/blackberry-com/asset/enterprise/pdf/direct/report-bb-2021-threat-report.pdf - webarchive
- https://www.politie.nl/nieuws/2019/oktober/2/11-servers-botnet-offline.html - webarchive
- https://www.fortinet.com/blog/threat-research/totolink-vulnerabilities-beastmode-mirai-campaign - webarchive
- https://www.uptycs.com/blog/mirai-code-re-use-in-gafgyt - webarchive
- https://blog.netlab.360.com/mirai_ptea-botnet-is-exploiting-undisclosed-kguard-dvr-vulnerability-en/ - webarchive
- https://unit42.paloaltonetworks.com/mirai-variant-echobot-resurfaces-with-13-previously-unexploited-vulnerabilities/ - webarchive
- https://unit42.paloaltonetworks.com/mirai-variant-iot-vulnerabilities/ - webarchive
- https://thehackernews.com/2022/04/hackers-exploiting-spring4shell.html - webarchive
- https://forensicitguy.github.io/extracting-indicators-from-packed-mirai/ - webarchive
- https://www.uptycs.com/blog/discovery-of-simps-botnet-leads-ties-to-keksec-group - webarchive
- https://www.tesorion.nl/en/resources/pdfstore/Report-OSINT-Russia-Ukraine-Conflict-Cyberaspect.pdf - webarchive
- https://unit42.paloaltonetworks.com/mirai-compiled-for-new-processor-surfaces/ - webarchive
- https://krebsonsecurity.com/2016/10/source-code-for-iot-botnet-mirai-released/ - webarchive
- https://www.stratosphereips.org/blog/2019/4/12/analysis-of-a-irc-based-botnet - webarchive
- https://blog.netlab.360.com/some_details_of_the_ddos_attacks_targeting_ukraine_and_russia_in_recent_days/ - webarchive
- https://blog.reversinglabs.com/blog/mirai-botnet-continues-to-plague-iot-space - webarchive
- https://blog.trendmicro.com/trendlabs-security-intelligence/new-mirai-variant-expands-arsenal-exploits-cve-2020-10173/ - webarchive
- https://blog.xlab.qianxin.com/mirai-nomi-en/ - webarchive
- https://medium.com/s2wblog/logs-of-log4shell-cve-2021-44228-log4j-is-ubiquitous-en-809064312039 - webarchive
- https://exchange.xforce.ibmcloud.com/collection/InfectedNight-Mirai-Variant-With-Massive-Attacks-On-Our-Honeypots-dbea3e9e39b8265e729545fa798e4d18 - webarchive
- https://unit42.paloaltonetworks.com/new-mirai-variant-mukashi/ - webarchive
- https://www.bleepingcomputer.com/news/security/mirai-activity-picks-up-once-more-after-publication-of-poc-exploit-code/ - webarchive
- https://synthesis.to/2021/06/30/automating_string_decryption.html - webarchive
- https://www.lacework.com/blog/mirai-goes-stealth-tls-iot-malware/ - webarchive
- https://blog.netlab.360.com/rimasuta-spread-with-ruijie-0day-en/ - webarchive
- https://unit42.paloaltonetworks.com/unit42-multi-exploit-iotlinux-botnets-mirai-gafgyt-target-apache-struts-sonicwall/ - webarchive
- https://cujo.com/mirai-gafgyt-with-new-ddos-modules-discovered/ - webarchive
- https://techcommunity.microsoft.com/t5/azure-sentinel/hunting-for-omi-vulnerability-exploitation-with-azure-sentinel/ba-p/2764093 - webarchive
- https://info.spamhaus.com/hubfs/Botnet%20Reports/Jan-Jun%202024%20Botnet%20Threat%20Update.pdf - webarchive
- https://github.com/jgamblin/Mirai-Source-Code - webarchive
- https://blog.netlab.360.com/what-our-honeypot-sees-just-one-day-after-the-spring4shell-advisory-en/ - webarchive
- https://isc.sans.edu/diary/22786 - webarchive
- https://www.cadosecurity.com/technical-analysis-of-the-ddos-attacks-against-ukrainian-websites/ - webarchive
- https://www.crowdstrike.com/blog/linux-targeted-malware-increased-by-35-percent-in-2021/ - webarchive
- https://unit42.paloaltonetworks.com/cve-2022-22954-vmware-vulnerabilities/ - webarchive
- https://www.fortinet.com/blog/threat-research/multiple-malware-campaigns-target-vmware-vulnerability - webarchive
- https://blog.malwaremustdie.org/2020/02/mmd-0065-2021-linuxmirai-fbot-re.html - webarchive
- https://unit42.paloaltonetworks.com/iot-vulnerabilities-mirai-payloads/ - webarchive
- https://unit42.paloaltonetworks.com/cve-2020-17496/ - webarchive
- https://www.lacework.com/blog/malware-targeting-latest-f5-vulnerability/ - webarchive
- https://www.youtube.com/watch?v=KVJyYTie-Dc - webarchive
- https://unit42.paloaltonetworks.com/new-mirai-variant-targets-enterprise-wireless-presentation-display-systems/ - webarchive
- https://blog.netlab.360.com/another-lilin-dvr-0-day-being-used-to-spread-mirai-en/ - webarchive
- https://researchcenter.paloaltonetworks.com/2018/07/unit42-finds-new-mirai-gafgyt-iotlinux-botnet-campaigns/ - webarchive
- https://deform.co/the-infamous-mirai-trojan-evolves-new-pandora-variant-targets-android-tvs/ - webarchive
- https://www.zscaler.com/blogs/security-research/threatlabz-analysis-log4shell-cve-2021-44228-exploit-attempts - webarchive
- http://osint.bambenekconsulting.com/feeds/ - webarchive
- https://unit42.paloaltonetworks.com/hoaxcalls-mirai-target-legacy-symantec-web-gateways/ - webarchive
- https://unit42.paloaltonetworks.com/new-mirai-variant-adds-8-new-exploits-targets-additional-iot-devices/ - webarchive
- https://www.cisecurity.org/insights/blog/top-10-malware-march-2022 - webarchive
- https://blog.netlab.360.com/wo-men-kan-dao-de-wu-ke-lan-bei-ddosgong-ji-xi-jie/ - webarchive
- https://www.fortinet.com/blog/threat-research/the-ghosts-of-mirai - webarchive
- https://blogs.jpcert.or.jp/en/2022/03/anti_upx_unpack.html - webarchive
- https://cybersecurity.att.com/blogs/labs-research/malware-hosting-domain-cyberium-fanning-out-mirai-variants - webarchive
- https://www.radware.com/getmedia/18d24c2d-c092-4a61-9ad6-ebb92b7a49b8/Alert_Realtek_SDK.aspx - webarchive
- https://community.riskiq.com/article/d8a78daf - webarchive
- https://krebsonsecurity.com/2017/12/mirai-iot-botnet-co-authors-plead-guilty/ - webarchive
- https://blog.trendmicro.com/trendlabs-security-intelligence/mirai-botnet-exploit-weaponized-to-attack-iot-devices-via-cve-2020-5902/ - webarchive
- http://www.simonroses.com/2016/10/mirai-ddos-botnet-source-code-binary-analysis/ - webarchive
- https://socradar.io/what-you-need-to-know-about-russian-cyber-escalation-in-ukraine/ - webarchive
- https://www.crowdstrike.com/blog/linux-mirai-malware-double-on-stronger-chips/ - webarchive
- https://prod-blog.avira.com/katana-a-new-variant-of-the-mirai-botnet - webarchive
- https://twitter.com/MsftSecIntel/status/1535417776290111489 - webarchive
- https://cert.gov.ua/article/37139 - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Mokes (ELF)
Internal MISP references
UUID 6d5a5357-4126-4950-b8c3-ee78b1172217
which can be used as unique global reference for Mokes (ELF)
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Momentum
Internal MISP references
UUID aaf8ce1b-3117-47c6-b756-809538ac8ff2
which can be used as unique global reference for Momentum
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Monti
A ransomware, derived from the leaked Conti source code.
Internal MISP references
UUID 7df77b77-00dd-4eba-a697-b9a7be262acc
which can be used as unique global reference for Monti
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
MooBot
Internal MISP references
UUID cd8deffe-eb0b-4451-8a13-11f6d291064a
which can be used as unique global reference for MooBot
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.moobot - webarchive
- https://otx.alienvault.com/pulse/6075b645942d5adf9bb8949b - webarchive
- https://www.justice.gov/opa/pr/justice-department-conducts-court-authorized-disruption-botnet-controlled-russian - webarchive
- https://media.defense.gov/2024/Feb/27/2003400753/-1/-1/0/CSA-RUSSIAN-ACTORS-USE-ROUTERS-FACILITATE-CYBER_OPERATIONS.PDF - webarchive
- https://blog.netlab.360.com/some_details_of_the_ddos_attacks_targeting_ukraine_and_russia_in_recent_days/ - webarchive
- https://blog.netlab.360.com/ddos-botnet-moobot-en/ - webarchive
- https://blog.netlab.360.com/moobot-0day-unixcctv-dvr-en/ - webarchive
- https://www.fortinet.com/blog/threat-research/mirai-based-botnet-moobot-targets-hikvision-vulnerability - webarchive
- https://unit42.paloaltonetworks.com/moobot-d-link-devices/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Moose
Internal MISP references
UUID 7fdb91ea-52dc-499c-81f9-3dd824e2caa0
which can be used as unique global reference for Moose
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.moose - webarchive
- http://www.welivesecurity.com/2016/11/02/linuxmoose-still-breathing/ - webarchive
- http://www.welivesecurity.com/2015/05/26/moose-router-worm/ - webarchive
- https://www.virusbulletin.com/uploads/pdf/magazine/2018/VB2018-Paquet-Clouston.pdf - webarchive
- http://gosecure.net/2016/11/02/exposing-the-ego-market-the-cybercrime-performed-by-the-linux-moose-botnet/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Mozi
Mozi is a IoT botnet, that makes use of P2P for communication and reuses source code of other well-known malware families, including Gafgyt, Mirai, and IoT Reaper.
Internal MISP references
UUID 236ba358-4c70-434c-a7ac-7a31e76c398a
which can be used as unique global reference for Mozi
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.mozi - webarchive
- https://blog.netlab.360.com/the-mostly-dead-mozi-and-its-lingering-bots/ - webarchive
- https://www.elastic.co/blog/collecting-and-operationalizing-threat-data-from-the-mozi-botnet - webarchive
- https://www.nozominetworks.com/blog/how-iot-botnets-evade-detection-and-analysis/ - webarchive
- https://www.cloudsek.com/blog/mozi-resurfaces-as-androxgh0st-botnet-unraveling-the-latest-exploitation-wave - webarchive
- https://www.microsoft.com/security/blog/2021/08/19/how-to-proactively-defend-against-mozi-iot-botnet/ - webarchive
- https://cujo.com/upx-anti-unpacking-techniques-in-iot-malware/ - webarchive
- https://blog.netlab.360.com/p2p-botnets-review-status-continuous-monitoring/ - webarchive
- https://blog.netlab.360.com/mozi-another-botnet-using-dht/ - webarchive
- https://blog.centurylink.com/new-mozi-malware-family-quietly-amasses-iot-bots/ - webarchive
- https://www.nozominetworks.com/blog/overcoming-the-challenges-of-detecting-p2p-botnets-on-your-network/ - webarchive
- https://www.youtube.com/watch?v=cDFO_MRlg3M - webarchive
- https://go.recordedfuture.com/hubfs/reports/cta-2021-1112.pdf - webarchive
- https://www.crowdstrike.com/blog/linux-targeted-malware-increased-by-35-percent-in-2021/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
MrBlack
MrBlack, first identified in May 2014 by Russian security firm Dr. Web, is a botnet that targets Linux OS and is designed to conduct distributed denial-of-service (DDoS) attacks. In May 2015, Incapsula clients suffered a large-scale DDoS attack which the company attributed to network traffic generated by tens of thousands of small office/home office (SOHO) routers infected with MrBlack. This massive botnet spans over 109 countries, especially in Thailand and Brazil.
MrBlack scans for and infects routers that have not had their default login credentials changed and that allow remote access to HTTP and SSH via port 80 and port 22, respectively. One of the most impacted router brands is Ubiquiti, a U.S.-based firm that provides bulk network hub solutions for internet service providers to lease to their customers. Once a vulnerable router is compromised and MrBlack is injected into the system, a remote server is contacted and system information from the device is transmitted. This allows the host server to receive commands in order to perform different types of DDoS attacks, download and execute files, and terminate processes.
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular MrBlack.
Known Synonyms |
---|
AESDDoS |
Dofloo |
Internal MISP references
UUID fc047e32-9cf2-4a92-861a-be882efd8a50
which can be used as unique global reference for MrBlack
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.mrblack - webarchive
- https://news.drweb.com/?i=5760&c=23&lng=en - webarchive
- https://www.bleepingcomputer.com/news/security/exposed-docker-apis-abused-by-ddos-cryptojacking-botnet-malware/ - webarchive
- https://www.virusbulletin.com/uploads/pdf/conference/vb2015/KalnaiHorejsi-VB2015.pdf - webarchive
- https://blog.syscall.party/post/aes-ddos-analysis-part-1/ - webarchive
- https://www.botconf.eu/wp-content/uploads/2015/12/OK-P13-Liu-Ya-Automatically-Classify-Unknown-Bots-by-The-Register-Messages.pdf - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Mumblehard
Internal MISP references
UUID 5f78127b-25d3-4f86-8a64-f9549b2db752
which can be used as unique global reference for Mumblehard
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Nextcry
Ransomware used against Linux servers.
Internal MISP references
UUID 7ec8a41f-c72e-4832-a5a4-9d7380cea083
which can be used as unique global reference for Nextcry
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Ngioweb (ELF)
Internal MISP references
UUID a4ad242c-6fd0-4b1d-8d97-8f48150bf242
which can be used as unique global reference for Ngioweb (ELF)
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.ngioweb - webarchive
- https://blog.netlab.360.com/an-analysis-of-linux-ngioweb-botnet-en/ - webarchive
- https://blog.netlab.360.com/linux-ngioweb-v2-going-after-iot-devices-en/ - webarchive
- https://twitter.com/IntezerLabs/status/1324346324683206657 - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Nimbo-C2 (ELF)
According to the author, Nimbo-C2 is yet another (simple and lightweight) C2 framework. The agent currently supports Windows x64 and Linux. It's written in Nim, with some usage of .NET (by dynamically loading the CLR to the process).
Internal MISP references
UUID 5dbdf2ea-a15b-4ad6-bf7a-a030998c66b4
which can be used as unique global reference for Nimbo-C2 (ELF)
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
NiuB
Golang-based RAT that offers execution of shell commands and download+run capability.
Internal MISP references
UUID 7c516b66-f4a4-406a-bf35-d898ac8bffec
which can be used as unique global reference for NiuB
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
NoaBot
Internal MISP references
UUID b5ee45a0-d75b-40e7-b737-3cfa1cc8246c
which can be used as unique global reference for NoaBot
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Nood RAT
Internal MISP references
UUID 59ac87c0-f2ce-4e83-83bd-299e123b72a7
which can be used as unique global reference for Nood RAT
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Nosedive
According to Black Lotus Labs, Nosedive is a custom variation of the Mirai implant that is supported on all major SOHO and IoT architectures (e.g. MIPS, ARM, SuperH, PowerPC, etc.). Nosedive implants are typically deployed from Tier 2 payload servers in the Raptor Train infrastructure through a unique URL encoding scheme and domain injection method. Nosedive droppers use this method to request payloads for specific C2s by encoding the requested C2 domain and joining it with a unique "key" that identifies the bot and the target architecture of the compromised device (e.g. MIPS, ARM, etc.), which is then injected into the Nosedive implant payload that is deployed to the Tier 1 node. Once deployed, Nosedive runs in-memory only and allows the operators to execute commands, upload and download files, and run DDoS attacks on compromised devices.
The malware and its associated droppers are memory-resident only and deleted from disk. This, in addition to anti-forensics techniques employed on these devices including the obfuscation of running process names, compromising devices through a multi-stage infection chain, and killing remote management processes, makes detection and forensics much more difficult.
Internal MISP references
UUID 13840bb0-494d-403e-a37d-65cf144d71e9
which can be used as unique global reference for Nosedive
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.nosedive - webarchive
- https://assets.lumen.com/is/content/Lumen/raptor-train-handbook-copy - webarchive
- https://media.defense.gov/2024/Sep/18/2003547016/-1/-1/0/CSA-PRC-LINKED-ACTORS-BOTNET.PDF - webarchive
- https://blog.lumen.com/derailing-the-raptor-train/ - webarchive
- https://www.justice.gov/d9/2024-09/redacted_24-mj-1484_signed_search_and_seizure_warrant_for_disclosure.pdf - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
NOTROBIN
FireEye states that NOTROBIN is a utility written in Go 1.10 and compiled to a 64-bit ELF binary for BSD systems. It periodically scans for and deletes files matching filename patterns and content characteristics. The purpose seems to be to block exploitation attempts against the CVE-2019-19781 vulnerability; however, FireEye believes that NOTROBIN provides backdoor access to the compromised system.
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular NOTROBIN.
Known Synonyms |
---|
remove_bds |
Internal MISP references
UUID aaeb76b3-3885-4dc6-9501-4504fed9f20b
which can be used as unique global reference for NOTROBIN
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.notrobin - webarchive
- https://blog.dcso.de/a-curious-case-of-cve-2019-19781-palware-remove_bds/ - webarchive
- https://news.sophos.com/en-us/2020/05/21/asnarok2/ - webarchive
- https://www.fireeye.com/blog/threat-research/2020/01/vigilante-deploying-mitigation-for-citrix-netscaler-vulnerability-while-maintaining-backdoor.html - webarchive
- https://intezer.com/blog/linux/elf-malware-analysis-101-linux-threats-no-longer-an-afterthought - webarchive
- https://dcso.de/2020/01/16/a-curious-case-of-cve-2019-19781-palware-remove_bds/ - webarchive
- https://www.fireeye.com/blog/products-and-services/2020/01/rough-patch-promise-it-will-be-200-ok.html - webarchive
- https://www.theregister.co.uk/2020/01/17/hackers_patch_citrix_vulnerability/ - webarchive
- https://www.intezer.com/blog/cloud-security/top-linux-cloud-threats-of-2020/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
OrBit
According to stormshield, Orbit is a two-stage malware that appeared in July 2022, discovered by Intezer lab. Acting as a stealer and backdoor on 64-bit Linux systems, it consists of an executable acting as a dropper and a dynamic library.
Internal MISP references
UUID ae9d84f2-60e5-4a33-98f4-a0061938ec6d
which can be used as unique global reference for OrBit
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Owari
Mirai variant by actor "Anarchy" that used CVE-2017-17215 in July 2018 to compromise 18,000+ devices.
Internal MISP references
UUID ec67f206-6464-48cf-a012-3cdfc1278488
which can be used as unique global reference for Owari
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.owari - webarchive
- https://twitter.com/hrbrmstr/status/1019922651203227653 - webarchive
- https://twitter.com/360Netlab/status/1019759516789821441 - webarchive
- https://blog.newskysecurity.com/understanding-the-iot-hacker-a-conversation-with-owari-sora-iot-botnet-author-117feff56863 - webarchive
- https://twitter.com/ankit_anubhav/status/1019647993547550720 - webarchive
- https://www.scmagazine.com/malware-author-anarchy-builds-18000-strong-huawei-router-botnet/article/782395/ - webarchive
- https://www.bleepingcomputer.com/news/security/router-crapfest-malware-author-builds-18-000-strong-botnet-in-a-day/ - webarchive
- https://www.fortinet.com/blog/threat-research/a-wicked-family-of-bots.html - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
p0sT5n1F3r
According to Yarix digital security, this is a malware that allows to sniff on HTTPS traffic, implemented as Apache module.
Internal MISP references
UUID cc48c6ae-d274-4ad0-b013-bd75041a20c8
which can be used as unique global reference for p0sT5n1F3r
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
P2Pinfect
P2Pinfect is a fast-growing multi platform botnet, the purpose of which is still unknown. Written in Rust, it is compatible with Windows and Linux, including a MIPS variant for Linux based routers and IoT devices. It is capable of brute forcing SSH logins and exploiting Redis servers in order to propagate itself both to random IPs on the internet and to hosts it can find references to in files present on the infected system.
Internal MISP references
UUID 31a32308-7034-4419-b1f3-56a4d64b4358
which can be used as unique global reference for P2Pinfect
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.p2pinfect - webarchive
- https://www.cadosecurity.com/p2pinfect-new-variant-targets-mips-devices/ - webarchive
- https://www.cadosecurity.com/blog/from-dormant-to-dangerous-p2pinfect-evolves-to-deploy-new-ransomware-and-cryptominer - webarchive
- https://www.cadosecurity.com/redis-p2pinfect/ - webarchive
- https://www.cadosecurity.com/cado-security-labs-researchers-witness-a-600x-increase-in-p2pinfect-traffic/ - webarchive
- https://unit42.paloaltonetworks.com/peer-to-peer-worm-p2pinfect/ - webarchive
- https://www.nozominetworks.com/blog/p2pinfect-worm-evolves-to-target-a-new-platform - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
pbot
P2P botnet derived from the Mirai source code.
Internal MISP references
UUID 7aff049d-9326-466d-bbcc-d62da673b32c
which can be used as unique global reference for pbot
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Penquin Turla
Internal MISP references
UUID 262e0cf2-2fed-4d37-8d7a-0fd62c712840
which can be used as unique global reference for Penquin Turla
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.penquin_turla - webarchive
- https://securelist.com/an-overview-of-targeted-attacks-and-apts-on-linux/98440/ - webarchive
- https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2018/03/07180251/Penquins_Moonlit_Maze_PDF_eng.pdf - webarchive
- https://www.blackberry.com/us/en/pdfviewer?file=/content/dam/blackberry-com/asset/enterprise/pdf/direct/report-bb-decade-of-the-rats.pdf - webarchive
- https://www.leonardo.com/documents/20142/10868623/Malware+Technical+Insight+_Turla+%E2%80%9CPenquin_x64%E2%80%9D.pdf - webarchive
- https://www.leonardocompany.com/documents/20142/10868623/Malware+Technical+Insight+_Turla+%E2%80%9CPenquin_x64%E2%80%9D.pdf - webarchive
- https://lab52.io/blog/looking-for-penquins-in-the-wild/ - webarchive
- https://securelist.com/files/2017/04/Penquins_Moonlit_Maze_PDF_eng.pdf - webarchive
- https://securelist.com/big-threats-using-code-similarity-part-1/97239/ - webarchive
- https://securelist.com/apt-trends-report-q2-2020/97937/ - webarchive
- https://securelist.com/files/2017/04/Penquins_Moonlit_Maze_AppendixB.pdf - webarchive
- https://twitter.com/juanandres_gs/status/944741575837528064 - webarchive
- https://www.youtube.com/watch?v=JXsjRUxx47E - webarchive
- https://www.intezer.com/blog/cloud-security/top-linux-cloud-threats-of-2020/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
perfctl
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular perfctl.
Known Synonyms |
---|
perfcc |
Internal MISP references
UUID 5a4408f2-6ee3-4c82-9ee2-a1b4290666be
which can be used as unique global reference for perfctl
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.perfctl - webarchive
- https://www.aquasec.com/blog/perfctl-a-stealthy-malware-targeting-millions-of-linux-servers/ - webarchive
- https://www.cadosecurity.com/blog/from-automation-to-exploitation-the-growing-misuse-of-selenium-grid-for-cryptomining-and-proxyjacking - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
PerlBot
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular PerlBot.
Known Synonyms |
---|
DDoS Perl IrcBot |
ShellBot |
Internal MISP references
UUID 24b77c9b-7e7e-4192-8161-b6727728170f
which can be used as unique global reference for PerlBot
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.perlbot - webarchive
- https://www.trendmicro.com/en_us/research/20/l/teamtnt-now-deploying-ddos-capable-irc-bot-tntbotinger.html - webarchive
- https://sysdig.com/blog/malware-analysis-shellbot-sysdig/ - webarchive
- https://therecord.media/agents-raid-home-of-kansas-man-seeking-info-on-botnet-that-infected-dod-network/ - webarchive
- https://unit42.paloaltonetworks.com/los-zetas-from-eleethub-botnet/ - webarchive
- https://jask.com/wp-content/uploads/2019/02/Shellbot-Campaign_v2.pdf - webarchive
- https://us-cert.cisa.gov/ncas/alerts/aa20-345a - webarchive
- https://twitter.com/Nocturnus/status/1308430959512092673 - webarchive
- https://blog.netlab.360.com/some_details_of_the_ddos_attacks_targeting_ukraine_and_russia_in_recent_days/ - webarchive
- https://documents.trendmicro.com/assets/Perl-Based_Shellbot_Looks_to_Target_Organizations_via_C&C_appendix.pdf - webarchive
- https://brianstadnicki.github.io/posts/malware-gitlab-perlbot/ - webarchive
- https://unit42.paloaltonetworks.com/cve-2020-17496/ - webarchive
- https://yoroi.company/research/outlaw-is-back-a-new-crypto-botnet-targets-european-organizations/ - webarchive
- https://asec.ahnlab.com/en/49769/ - webarchive
- https://asec.ahnlab.com/en/54647/ - webarchive
- https://unit42.paloaltonetworks.com/cve-2022-22954-vmware-vulnerabilities/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Persirai
Internal MISP references
UUID 2ee05352-3d4a-448b-825d-9d6c10792bf7
which can be used as unique global reference for Persirai
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
PG_MEM
Internal MISP references
UUID 74ffa404-9082-4db9-ac19-18a875db9fe7
which can be used as unique global reference for PG_MEM
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
PigmyGoat
Internal MISP references
UUID fcdcdc68-4c82-4d3d-aef1-96eac0a62761
which can be used as unique global reference for PigmyGoat
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
PingPull
Internal MISP references
UUID 65a7944c-15d9-4ca5-8561-7c97b18684c8
which can be used as unique global reference for PingPull
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Pink
A botnet with P2P and centralized C&C capabilities.
Internal MISP references
UUID 67063764-a47c-4058-9cb2-1685ffa14fe8
which can be used as unique global reference for Pink
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
PLEAD (ELF)
Internal MISP references
UUID de3c14aa-f9f4-4071-8e6e-a2c16a3394ad
which can be used as unique global reference for PLEAD (ELF)
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.plead - webarchive
- https://www.vmware.com/content/dam/digitalmarketing/vmware/en/pdf/docs/vmw-exposing-malware-in-linux-based-multi-cloud-environments.pdf - webarchive
- https://www.ironnet.com/blog/china-cyber-attacks-the-current-threat-landscape - webarchive
- https://cyberandramen.net/2021/02/11/blacktech-updates-elf-plead-backdoor/ - webarchive
- https://www.macnica.net/file/mpressioncss_ta_report_2019_2_nopw.pdf - webarchive
- https://blogs.jpcert.or.jp/en/2020/11/elf-plead.html - webarchive
- https://www.intezer.com/blog/cloud-security/top-linux-cloud-threats-of-2020/ - webarchive
- https://jp.security.ntt/resources/EN-BlackTech_2021.pdf - webarchive
- https://www.cyberandramen.net/home/blacktech-doesnt-miss-a-step-a-quick-analysis-of-a-busy-2020 - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Poseidon (ELF)
Part of Mythic C2, written in Golang.
Internal MISP references
UUID ad796632-2595-4ae5-a563-b92197210d61
which can be used as unique global reference for Poseidon (ELF)
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.poseidon - webarchive
- https://www.seqrite.com/blog/umbrella-of-pakistani-threats-converging-tactics-of-cyber-operations-targeting-india/ - webarchive
- https://github.com/MythicAgents/poseidon - webarchive
- https://brandefense.io/blog/apt-36-campaign-poseidon-malware-technical-analysis/ - webarchive
- https://cert.gov.ua/article/6123309 - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
PRISM
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular PRISM.
Known Synonyms |
---|
waterdrop |
Internal MISP references
UUID 9a4a866b-84a9-4778-8de8-2780a27c0597
which can be used as unique global reference for PRISM
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
PrivetSanya
Black Lotus Labs identified malware for the Windows Subsystem for Linux (WSL). Mostly written in Python but compiled as Linux ELF files.
Internal MISP references
UUID 41e5aafb-5847-421e-813d-627414ee31bb
which can be used as unique global reference for PrivetSanya
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Prometei (ELF)
Internal MISP references
UUID b6899bda-54e9-4953-8af5-22af39776b69
which can be used as unique global reference for Prometei (ELF)
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.prometei - webarchive
- https://twitter.com/IntezerLabs/status/1338480158249013250 - webarchive
- https://cujo.com/iot-malware-journals-prometei-linux/ - webarchive
- https://www.trendmicro.com/en_us/research/21/e/proxylogon-a-coinminer--a-ransomware--and-a-botnet-join-the-part.html - webarchive
- https://blog.talosintelligence.com/2020/12/2020-year-in-malware.html - webarchive
- https://blog.talosintelligence.com/2020/07/prometei-botnet-and-its-quest-for-monero.html - webarchive
- https://www.cybereason.com/blog/prometei-botnet-exploiting-microsoft-exchange-vulnerabilities - webarchive
- https://www.intezer.com/blog/cloud-security/top-linux-cloud-threats-of-2020/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Pro-Ocean
Unit 42 describes this as a malware used by Rocke Group that deploys an XMRig miner.
Internal MISP references
UUID aa918c10-e5c7-4abd-b8c0-3c938a6675f5
which can be used as unique global reference for Pro-Ocean
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.pro_ocean - webarchive
- https://seguranca-informatica.pt/new-cryptojacking-malware-called-pro-ocean-is-now-attacking-apache-oracle-and-redis-servers/ - webarchive
- https://unit42.paloaltonetworks.com/pro-ocean-rocke-groups-new-cryptojacking-malware/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
pupy (ELF)
Pupy is an open-source, cross-platform RAT and post-exploitation framework mainly written in python. Pupy can be loaded from various loaders, including PE EXE, reflective DLL, Linux ELF, pure python, powershell and APK. Most of the loaders bundle an embedded python runtime, python library modules in source/compiled/native forms as well as a flexible configuration. They bootstrap a python runtime environment mostly in-memory for the later stages of pupy to run in. Pupy can communicate using various transports, migrate into processes, load remote python code, python packages and python C-extensions from memory.
Internal MISP references
UUID 92a1288f-cc4d-47ca-8399-25fe5a39cf2d
which can be used as unique global reference for pupy (ELF)
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Qilin
Internal MISP references
UUID d97af6c5-640f-46b4-943c-0e8940f8011e
which can be used as unique global reference for Qilin
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
QNAPCrypt
The QNAPCrypt ransomware works similarly to other ransomware, including encrypting all files and delivering a ransom note. However, there are several important differences:
-
The ransom note was included solely as a text file, without any message on the screen—naturally, because it is a server and not an endpoint.
-
Every victim is provided with a different, unique Bitcoin wallet—this could help the attackers avoid being traced.
-
Once a victim is compromised, the malware requests a wallet address and a public RSA key from the command and control server (C&C) before file encryption.
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular QNAPCrypt.
Known Synonyms |
---|
eCh0raix |
Internal MISP references
UUID a0b12e5f-0257-41f1-beda-001ad944c4ca
which can be used as unique global reference for QNAPCrypt
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.qnapcrypt - webarchive
- https://www.vmware.com/content/dam/digitalmarketing/vmware/en/pdf/docs/vmw-exposing-malware-in-linux-based-multi-cloud-environments.pdf - webarchive
- https://www.bleepingcomputer.com/news/security/qnap-warns-of-ech0raix-ransomware-attacks-roon-server-zero-day/ - webarchive
- https://www.intezer.com/blog-seizing-15-active-ransomware-campaigns-targeting-linux-file-storage-servers/ - webarchive
- https://www.qnap.com/en/security-advisory/QSA-20-02 - webarchive
- https://intezer.com/blog/linux/elf-malware-analysis-101-linux-threats-no-longer-an-afterthought - webarchive
- https://www.intezer.com/blog-russian-cybercrime-group-fullofdeep-behind-qnapcrypt-ransomware-campaigns/ - webarchive
- https://www.ibm.com/downloads/cas/Z81AVOY7 - webarchive
- https://www.intezer.com/blog/malware-analysis/when-viruses-mutate-did-suncrypt-ransomware-evolve-from-qnapcrypt - webarchive
- https://blog.netlab.360.com/qnap-nas-users-make-sure-you-check-your-system/ - webarchive
- https://documents.trendmicro.com/assets/pdf/wp-backing-your-backup-defending-nas-devices-against-evolving-threats.pdf - webarchive
- https://unit42.paloaltonetworks.com/ech0raix-ransomware-soho/ - webarchive
- https://www.anomali.com/blog/the-ech0raix-ransomware - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
QSnatch
The malware infects QNAP NAS devices, is persisting via various mechanisms and resists cleaning by preventing firmware updates and interfering with QNAP MalwareRemover. The malware steals passwords and hashes
Internal MISP references
UUID 48389957-30e2-4747-b4c6-8b8a9f15250f
which can be used as unique global reference for QSnatch
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.qsnatch - webarchive
- https://www.trendmicro.com/en_us/research/21/l/the-evolution-of-iot-linux-malware-based-on-mitre-att&ck-ttps.html - webarchive
- https://www.ncsc.gov.uk/files/NCSC%20CISA%20Alert%20-QNAP%20NAS%20Devices.pdf - webarchive
- https://bin.re/blog/the-dga-of-qsnatch/ - webarchive
- https://www.kyberturvallisuuskeskus.fi/en/news/qsnatch-malware-designed-qnap-nas-devices - webarchive
- https://documents.trendmicro.com/assets/pdf/wp-backing-your-backup-defending-nas-devices-against-evolving-threats.pdf - webarchive
- https://us-cert.cisa.gov/ncas/alerts/aa20-209a - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
QUIETEXIT
Mandiant observed this backdoor being observed by UNC3524. It is based on the open-source Dropbear SSH source code.
Internal MISP references
UUID 6a5ab9ca-944c-4187-bdef-308516745d18
which can be used as unique global reference for QUIETEXIT
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
r2r2
Internal MISP references
UUID 759f8590-a049-4c14-be8a-e6605e2cd43d
which can be used as unique global reference for r2r2
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
RagnarLocker (ELF)
Internal MISP references
UUID 5f96787e-fc9f-486b-a15f-f46c8179a4d5
which can be used as unique global reference for RagnarLocker (ELF)
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.ragnarlocker - webarchive
- https://noticeofpleadings.com/crackedcobaltstrike/files/ComplaintAndSummons/1%20-Microsoft%20Cobalt%20Strike%20-%20Complaint(907040021.9).pdf - webarchive
- https://techcrunch.com/2023/10/20/ragnarlocker-ransomware-dark-web-portal-seized-in-international-sting/?guccounter=1 - webarchive
- https://twitter.com/malwrhunterteam/status/1475568201673105409 - webarchive
- https://www.trellix.com/en-us/about/newsroom/stories/threat-labs/analysis-and-protections-for-ragnarlocker-ransomware.html - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Rakos
Internal MISP references
UUID 4592384c-48a7-4e16-b492-7add50a7d2f5
which can be used as unique global reference for Rakos
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
RansomEXX (ELF)
According to SentineOne, RansomEXX (aka Defray, Defray777), a multi-pronged extortion threat, has been observed in the wild since late 2020. RansomEXX is associated with attacks against the Texas Department of Transportation, Groupe Atlantic, and several other large enterprises. There are Windows and Linux variants of this malware family, and they are known for their limited and exclusive targeting.
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular RansomEXX (ELF).
Known Synonyms |
---|
Defray777 |
Internal MISP references
UUID 946814a1-957c-48ce-9068-fdef24a025bf
which can be used as unique global reference for RansomEXX (ELF)
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.ransomexx - webarchive
- https://www.vmware.com/content/dam/digitalmarketing/vmware/en/pdf/docs/vmw-exposing-malware-in-linux-based-multi-cloud-environments.pdf - webarchive
- https://docs.google.com/spreadsheets/d/1MI8Z2tBhmqQ5X8Wf_ozv3dVjz5sJOs-3 - webarchive
- https://www.cybereason.com/blog/cybereason-vs.-ransomexx-ransomware - webarchive
- https://go.crowdstrike.com/rs/281-OBQ-266/images/Report2021GTR.pdf - webarchive
- https://www.paloaltonetworks.com/content/dam/pan/en_US/assets/pdf/reports/Unit_42/unit42-ransomware-threat-report-2021.pdf - webarchive
- https://www.ctir.gov.br/arquivos/alertas/2020/alerta_2020_03_ataques_de_ransomware.pdf - webarchive
- https://www.bleepingcomputer.com/news/security/ecuadors-state-run-cnt-telco-hit-by-ransomexx-ransomware/ - webarchive
- https://web.archive.org/web/20210305181115/https://cisoclub.ru/doc/otchet-kompanii-group-ib-ransomware-uncovered-2020-2021/?bp-attachment=group-ib_ransomware_uncovered_2020-2021.pdf - webarchive
- https://www.ic3.gov/Media/News/2021/211101.pdf - webarchive
- https://www.sentinelone.com/anthology/ransomexx/ - webarchive
- https://www.intezer.com/blog/cloud-security/top-linux-cloud-threats-of-2020/ - webarchive
- https://cisoclub.ru/doc/otchet-kompanii-group-ib-ransomware-uncovered-2020-2021/?bp-attachment=group-ib_ransomware_uncovered_2020-2021.pdf - webarchive
- https://securelist.com/ransomexx-trojan-attacks-linux-systems/99279/ - webarchive
- https://krebsonsecurity.com/2021/08/ransomware-gangs-and-the-name-game-distraction/ - webarchive
- https://www.youtube.com/watch?v=qxPXxWMI2i4 - webarchive
- https://gustavopalazolo.medium.com/ransomexx-an%C3%A1lise-do-ransomware-utilizado-no-ataque-ao-stj-918001ec8195 - webarchive
- https://securityintelligence.com/x-force/ransomexx-upgrades-rust/ - webarchive
- https://blogs.vmware.com/security/2022/09/esxi-targeting-ransomware-the-threats-that-are-after-your-virtual-machines-part-1.html - webarchive
- https://www.crowdstrike.com/blog/carbon-spider-sprite-spider-target-esxi-servers-with-ransomware/ - webarchive
- https://www.crowdstrike.com/blog/carbon-spider-sprite-spider-target-esxi-servers-with-ransomware/?utm_campaign=blog&utm_medium=soc&utm_source=twtr&utm_content=sprout - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
RansomExx2
According to IBM Security X-Force, this is a new but functionally very similar version of RansomExx, fully rewritten in Rust and internally referred to as RansomExx2.
Internal MISP references
UUID c6d750d5-fa47-4fcb-9d24-2682036fc6e5
which can be used as unique global reference for RansomExx2
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
RapperBot
A Mirai derivate bruteforcing SSH servers.
Internal MISP references
UUID 914c94eb-38e2-4cb8-a62b-21fbe9c48496
which can be used as unique global reference for RapperBot
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.rapper_bot - webarchive
- https://www.fortinet.com/blog/threat-research/rapperbot-malware-discovery - webarchive
- https://socradar.io/linux-malware-rapperbot-brute-forcing-ssh-servers/ - webarchive
- https://www.fortinet.com/blog/threat-research/new-rapperbot-campaign-ddos-attacks - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
RaspberryPiBotnet
Internal MISP references
UUID 8dee025b-2233-4cd8-af02-fcdcd40b378f
which can be used as unique global reference for RaspberryPiBotnet
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
rat_hodin
Internal MISP references
UUID 6aacf515-de49-4afc-a135-727c9beaab0b
which can be used as unique global reference for rat_hodin
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
rbs_srv
Internal MISP references
UUID a08d9f8b-2cc5-48c2-8cce-ee713bcdc4b7
which can be used as unique global reference for rbs_srv
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
RedTail
RedTail is a cryptomining malware, which is based on the open-source XMRIG mining software. It is being spread via known vulnerabilities such as: - CVE-2024-3400 - CVE-2023-46805 - CVE-2024-21887 - CVE-2023-1389 - CVE-2022-22954 - CVE-2018-20062
Internal MISP references
UUID ba89a509-ff8e-446b-867c-7f15efe0477f
which can be used as unique global reference for RedTail
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
RedXOR
RedXOR is a sophisticated backdoor targeting Linux systems disguised as polkit daemon and utilizing network data encoding based on XOR. Believed to be developed by Chinese nation-state actors, this malware shows similarities to other malware associated with the Winnti umbrella threat group.
RedXOR uses various techniques such as open-source LKM rootkits, Python pty shell, and network data encoding with XOR. It also employs persistence methods and communication with a Command and Control server over HTTP.
The malware can execute various commands including system information collection, updates, shell commands, and network tunneling.
Internal MISP references
UUID 421b2ec7-d4e6-4fc8-9bd3-55fe26337aae
which can be used as unique global reference for RedXOR
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
RedAlert Ransomware
Ransomware that targets Linux VMware ESXi servers. Encryption procedure uses the NTRUEncrypt public-key encryption algorithm.
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular RedAlert Ransomware.
Known Synonyms |
---|
N13V |
Internal MISP references
UUID 12137c8d-d3f4-44fe-b25e-2fb5f90cecce
which can be used as unique global reference for RedAlert Ransomware
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.red_alert - webarchive
- https://www.bleepingcomputer.com/news/security/new-redalert-ransomware-targets-windows-linux-vmware-esxi-servers/ - webarchive
- https://blogs.vmware.com/security/2022/09/esxi-targeting-ransomware-the-threats-that-are-after-your-virtual-machines-part-1.html - webarchive
- https://blog.cyble.com/2022/07/12/new-ransomware-groups-on-the-rise/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Rekoobe
A Trojan for Linux intended to infect machines with the SPARC architecture and Intel x86, x86-64 computers. The Trojan’s configuration data is stored in a file encrypted with XOR algorithm
Internal MISP references
UUID 48b9a9fd-4c1a-428a-acc0-40b1a3fa7590
which can be used as unique global reference for Rekoobe
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.rekoobe - webarchive
- https://documents.trendmicro.com/assets/txt/earth-berberoka-linux-iocs-2.txt - webarchive
- https://hunt.io/blog/rekoobe-backdoor-discovered-in-open-directory-possibly-targeting-tradingview-users - webarchive
- https://www.sekoia.io/en/walking-on-apt31-infrastructure-footprints/ - webarchive
- https://yoroi.company/research/shadows-from-the-past-threaten-italian-enterprises/ - webarchive
- https://asec.ahnlab.com/en/55229/ - webarchive
- https://intezer.com/blog-linux-rekoobe-operating-with-new-undetected-malware-samples/ - webarchive
- https://vms.drweb.com/virus/?i=7754026&lng=en - webarchive
- https://sansec.io/research/rekoobe-fishpig-magento - webarchive
- https://www.intezer.com/blog/malware-analysis/elf-malware-analysis-101-part-3-advanced-analysis/ - webarchive
- https://decoded.avast.io/davidalvarez/linux-threat-hunting-syslogk-a-kernel-rootkit-found-under-development-in-the-wild/ - webarchive
- https://twitter.com/billyleonard/status/1458531997576572929 - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
reptile
Internal MISP references
UUID 934478a1-1243-4c26-8360-be3d01ae193e
which can be used as unique global reference for reptile
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.reptile - webarchive
- https://asec.ahnlab.com/en/55785/ - webarchive
- https://github.com/f0rb1dd3n/Reptile - webarchive
- https://documents.trendmicro.com/assets/white_papers/wp-operation-earth-berberoka.pdf - webarchive
- https://dfir.ch/posts/reptile_launcher/ - webarchive
- https://www.botconf.eu/wp-content/uploads/2022/05/Botconf2022-40-LunghiHorejsi.pdf - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
REvil (ELF)
ELF version of win.revil targeting VMware ESXi hypervisors.
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular REvil (ELF).
Known Synonyms |
---|
REvix |
Internal MISP references
UUID d9d76456-01a3-4dcd-afc2-87529e00c1ba
which can be used as unique global reference for REvil (ELF)
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.revil - webarchive
- https://www.darktrace.com/en/blog/staying-ahead-of-r-evils-ransomware-as-a-service-business-model/ - webarchive
- https://www.flashpoint-intel.com/blog/interview-with-revil-affiliated-ransomware-contractor/ - webarchive
- https://www.vmware.com/content/dam/digitalmarketing/vmware/en/pdf/docs/vmw-exposing-malware-in-linux-based-multi-cloud-environments.pdf - webarchive
- https://www.youtube.com/watch?v=ptbNMlWxYnE - webarchive
- https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RE54L7v - webarchive
- https://malienist.medium.com/revix-linux-ransomware-d736956150d0 - webarchive
- https://home.treasury.gov/news/press-releases/jy0471 - webarchive
- https://www.accenture.com/us-en/blogs/cyber-defense/moving-left-ransomware-boom - webarchive
- https://www.br.de/nachrichten/deutschland-welt/mutmasslicher-ransomware-millionaer-identifiziert,Sn3iHgJ - webarchive
- https://www.crowdstrike.com/blog/big-game-hunting-on-the-rise-again-according-to-ecrime-index/ - webarchive
- https://www.flashpoint-intel.com/blog/revil-disappears-again/ - webarchive
- https://threatpost.com/ransomware-revil-sites-disappears/167745/ - webarchive
- https://us-cert.cisa.gov/ncas/current-activity/2021/07/04/cisa-fbi-guidance-msps-and-their-customers-affected-kaseya-vsa - webarchive
- https://cybersecurity.att.com/blogs/labs-research/revils-new-linux-version - webarchive
- https://www.bbc.com/news/technology-59297187 - webarchive
- https://www.reuters.com/technology/exclusive-governments-turn-tables-ransomware-gang-revil-by-pushing-it-offline-2021-10-21/ - webarchive
- https://russian.rt.com/russia/article/926347-barnaulec-rozysk-fbr-kibermoshennichestvo - webarchive
- https://ke-la.com/will-the-revils-story-finally-be-over/ - webarchive
- https://storage.courtlistener.com/recap/gov.uscourts.txnd.351760/gov.uscourts.txnd.351760.1.0_3.pdf - webarchive
- https://www.crowdstrike.com/blog/how-big-game-hunting-ttps-shifted-after-darkside-pipeline-attack/ - webarchive
- https://www.trendmicro.com/vinfo/us/security/news/ransomware-spotlight/ransomware-spotlight-revil - webarchive
- https://www.advintel.io/post/storm-in-safe-haven-takeaways-from-russian-authorities-takedown-of-revil - webarchive
- https://threatpost.com/linux-variant-ransomware-vmwares-nas/167511/ - webarchive
- https://www.crowdstrike.com/blog/hypervisor-jackpotting-ecrime-actors-increase-targeting-of-esxi-servers/ - webarchive
- https://therecord.media/us-arrests-and-charges-ukrainian-man-for-kaseya-ransomware-attack/ - webarchive
- https://twitter.com/IntezerLabs/status/1452980772953071619 - webarchive
- https://krebsonsecurity.com/2021/11/revil-ransom-arrest-6m-seizure-and-10m-reward/ - webarchive
- https://www.darkowl.com/blog-content/page-not-found-revil-darknet-services-offline-after-attack-last-weekend - webarchive
- https://otx.alienvault.com/pulse/60da2c80aa5400db8f1561d5 - webarchive
- https://www.secureworks.com/blog/revil-ransomware-reemerges-after-shutdown-universal-decryptor-released - webarchive
- https://storage.courtlistener.com/recap/gov.uscourts.txnd.352371/gov.uscourts.txnd.352371.1.0_1.pdf - webarchive
- https://www.elliptic.co/blog/revil-revealed-tracking-ransomware-negotiation-and-payment - webarchive
- https://twitter.com/VK_Intel/status/1409601311092490248 - webarchive
- https://www.digitalshadows.com/blog-and-research/revil-analysis-of-competing-hypotheses/ - webarchive
- https://github.com/f0wl/REconfig-linux - webarchive
- https://diicot.ro/mass-media/3341-comunicat-de-presa-2-08-11-2021 - webarchive
- https://www.fbi.gov/wanted/cyber/yevgyeniy-igoryevich-polyanin - webarchive
- https://www.microsoft.com/security/blog/2022/05/09/ransomware-as-a-service-understanding-the-cybercrime-gig-economy-and-how-to-protect-yourself - webarchive
- https://www.youtube.com/watch?v=mDUMpYAOMOo - webarchive
- https://documents.trendmicro.com/assets/rpt/rpt-navigating-new-frontiers-trend-micro-2021-annual-cybersecurity-report.pdf - webarchive
- https://angle.ankura.com/post/102hcny/revix-linux-ransomware - webarchive
- https://www.justice.gov/opa/pr/ukrainian-arrested-and-charged-ransomware-attack-kaseya - webarchive
- https://www.trendmicro.com/en_in/research/21/k/global-operations-lead-to-arrests-of-alleged-members-of-gandcrab.html - webarchive
- https://twitter.com/VK_Intel/status/1409601311092490248?s=20 - webarchive
- https://twitter.com/AdamTheAnalyst/status/1409499591452639242?s=20 - webarchive
- http://www.fsb.ru/fsb/press/message/single.htm%21id%3D10439388%40fsbMessage.html - webarchive
- https://www.domaintools.com/resources/blog/the-most-prolific-ransomware-families-a-defenders-guide - webarchive
- https://blogs.vmware.com/security/2022/09/esxi-targeting-ransomware-the-threats-that-are-after-your-virtual-machines-part-1.html - webarchive
- https://cybleinc.com/2021/07/03/uncensored-interview-with-revil-sodinokibi-ransomware-operators/ - webarchive
- https://www.fincen.gov/sites/default/files/advisory/2021-11-08/FinCEN%20Ransomware%20Advisory_FINAL_508_.pdf - webarchive
- https://www.bleepingcomputer.com/news/security/revil-ransomware-shuts-down-again-after-tor-sites-were-hijacked/ - webarchive
- https://analyst1.com/file-assets/History-of-REvil.pdf - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Rex
Internal MISP references
UUID 49639ff5-e0be-4b6a-850b-d5d8dd37e62b
which can be used as unique global reference for Rex
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
RHOMBUS
Internal MISP references
UUID af886910-9a0b-478e-b53d-54c8a103acb4
which can be used as unique global reference for RHOMBUS
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Rhysida (ELF)
Internal MISP references
UUID 1dbd7cbb-960d-4ef4-9520-1748fb7cd4c6
which can be used as unique global reference for Rhysida (ELF)
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Roboto
P2P Botnet discovered by Netlab360. The botnet infects linux servers via the Webmin RCE vulnerability (CVE-2019-15107) which allows attackers to run malicious code with root privileges and take over older Webmin versions. Based on the Netlabs360 analysis, the botnet serves mainly 7 functions: reverse shell, self-uninstall, gather process' network information, gather Bot information, execute system commands, run encrypted files specified in URLs and four DDoS attack methods: ICMP Flood, HTTP Flood, TCP Flood, and UDP Flood.
Internal MISP references
UUID e18bf514-b978-4bef-b4d9-834a5100fced
which can be used as unique global reference for Roboto
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
RotaJakiro
RotaJakiro is a stealthy Linux backdoor which remained undetected between 2018 and 2021. The malware uses rotating encryption to encrypt the resource information within the sample, and C2 communication, using a combination of AES, XOR, ROTATE encryption and ZLIB compression.
Internal MISP references
UUID 66fb7b48-60f2-44fc-9cbe-f70e776d058b
which can be used as unique global reference for RotaJakiro
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.rotajakiro - webarchive
- https://blog.netlab.360.com/rotajakiro_linux_version_of_oceanlotus/ - webarchive
- https://www.domaintools.com/resources/blog/domaintools-and-digital-archeology-a-look-at-rotajakiro - webarchive
- https://blog.netlab.360.com/stealth_rotajakiro_backdoor_en/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Royal Ransom (ELF)
According to Trendmicro, Royal ransomware was first observed in September 2022, and the threat actors behind it are believed to be seasoned cybercriminals who used to be part of Conti Team One.
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Royal Ransom (ELF).
Known Synonyms |
---|
Royal |
Royal_unix |
Internal MISP references
UUID 4e29dae1-5a8c-4b3c-81dc-dcc0fdd3c93a
which can be used as unique global reference for Royal Ransom (ELF)
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.royal_ransom - webarchive
- https://blog.talosintelligence.com/talos-ir-q2-2023-quarterly-recap/ - webarchive
- https://unit42.paloaltonetworks.com/royal-ransomware/ - webarchive
- https://www.trendmicro.com/en_us/research/23/b/royal-ransomware-expands-attacks-by-targeting-linux-esxi-servers.html - webarchive
- https://blog.sekoia.io/exposing-fakebat-loader-distribution-methods-and-adversary-infrastructure/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Rshell
Internal MISP references
UUID 4947e9d3-aa13-4359-ac43-c1c436c409c9
which can be used as unique global reference for Rshell
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
RudeDevil
Internal MISP references
UUID 923ee959-4ea5-46c5-8926-84e41ca77ca4
which can be used as unique global reference for RudeDevil
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
SALTWATER
According to Mandiant, SALTWATER is a module for the Barracuda SMTP daemon (bsmtpd) that has backdoor functionality. SALTWATER can upload or download arbitrary files, execute commands, and has proxy and tunneling capabilities. The backdoor is implemented using hooks on the send, recv, close syscalls via the 3rd party kubo/funchook hooking library, and amounts to five components, most of which are referred to as "Channels" within the binary. In addition to providing backdoor and proxying capabilities, these components exhibit classic backdoor functionality.
Internal MISP references
UUID d55ea436-b2c1-400c-99dc-6e35bc05438b
which can be used as unique global reference for SALTWATER
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Satori
Satori is a variation of elf.mirai which was first detected around 2017-11-27 by 360 Netlab. It uses exploit to exhibit worm-like behaviour to spread over ports 37215 and 52869 (CVE-2014-8361).
Internal MISP references
UUID 9e5d83a8-1181-43fe-a77f-28c8c75ffbd0
which can be used as unique global reference for Satori
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.satori - webarchive
- https://www.arbornetworks.com/blog/asert/the-arc-of-satori/ - webarchive
- https://blog.radware.com/security/botnets/2018/02/new-satori-botnet-variant-enslaves-thousands-dasan-wifi-routers/ - webarchive
- https://unit42.paloaltonetworks.com/satori-mirai-botnet-variant-targeting-vantage-velocity-field-unit-rce-vulnerability/ - webarchive
- http://www.eweek.com/security/collaborative-takedown-kills-iot-worm-satori - webarchive
- http://blog.netlab.360.com/warning-satori-a-new-mirai-variant-is-spreading-in-worm-style-on-port-37215-and-52869-en/ - webarchive
- http://blog.netlab.360.com/art-of-steal-satori-variant-is-robbing-eth-bitcoin-by-replacing-wallet-address-en/ - webarchive
- https://krebsonsecurity.com/2018/09/alleged-satori-iot-botnet-operator-sought-media-spotlight-got-indicted/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
SBIDIOT
Internal MISP references
UUID b4c20cf4-8e94-4523-8d48-7781aab6785d
which can be used as unique global reference for SBIDIOT
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.sbidiot - webarchive
- https://www.nozominetworks.com/blog/how-iot-botnets-evade-detection-and-analysis/ - webarchive
- https://www.nozominetworks.com/blog/threat-intelligence-analysis-of-the-sbidiot-iot-malware/ - webarchive
- https://brianstadnicki.github.io/posts/malware-sbidiot-dec2021/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
SEASPY
According to CISA, this malware is a persistent backdoor that masquerades as a legitimate Barracuda Networks service. The malware is designed to listen to commands received from the Threat Actor’s Command-and-Control through TCP packets. When executed, the malware uses libpcap sniffer to monitor traffic for a magic packet on TCP port 25 (SMTP) and TCP port 587. It checks the network packet captured for a hard-coded string. When the right sequence of packet is captured, it establishes a TCP reverse shell to the C2 server for further exploitation. This allows the TA to execute arbitrary commands on the compromised system. The malware is based on an open-source backdoor program named "cd00r".
Internal MISP references
UUID a6699c42-69d8-4bdd-8dd9-72f4c80efefa
which can be used as unique global reference for SEASPY
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.seaspy - webarchive
- https://www.cisa.gov/news-events/alerts/2023/07/28/cisa-releases-malware-analysis-reports-barracuda-backdoors - webarchive
- https://www.mandiant.com/resources/blog/barracuda-esg-exploited-globally - webarchive
- https://www.mandiant.com/resources/blog/chinese-espionage-tactics - webarchive
- https://www.cisa.gov/news-events/analysis-reports/ar23-209b - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
sedexp
Internal MISP references
UUID 4e71e8ab-a34a-494f-814d-cc983a2de463
which can be used as unique global reference for sedexp
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
ShellBind
Internal MISP references
UUID b51caf06-736e-46fc-9b13-48b0b81df4b7
which can be used as unique global reference for ShellBind
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Shishiga
Internal MISP references
UUID 51da734c-70dd-4337-ab08-ab61457e0da5
which can be used as unique global reference for Shishiga
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
SideWalk (ELF)
Internal MISP references
UUID ec994efc-a8a4-4e92-ada2-e37d421baf01
which can be used as unique global reference for SideWalk (ELF)
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.sidewalk - webarchive
- https://www.welivesecurity.com/2022/09/14/you-never-walk-alone-sidewalk-backdoor-linux-variant/ - webarchive
- https://www.mandiant.com/resources/blog/chinese-espionage-tactics - webarchive
- https://www.fortinet.com/blog/threat-research/threat-actors-exploit-geoserver-vulnerability-cve-2024-36401 - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Silex
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Silex.
Known Synonyms |
---|
silexbot |
Internal MISP references
UUID bf059cb4-f73a-4181-bf71-d8da7bf50dd8
which can be used as unique global reference for Silex
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
SimpleTea (ELF)
SimpleTea for Linux is an HTTP(S) RAT.
It was discovered in Q1 2023 as an instance of the Lazarus group's Operation DreamJob campaign for Linux. It was a payload downloaded in an execution chain which started with an HSBC-themed job offer lure. It shared the same C&C server as payloads from the 3CX incident around the same time.
It’s an object-oriented project, which does not run on Linux distributions without a graphical user interface, and decrypts its configuration from /home/%user%/.config/apdl.cf using 0x7E as the XOR key. It uses AES-GCM for encryption and decryption of its network traffic.
It supports basic commands that include operations on the victim’s filesystem, manipulation with its configuration, file exfiltration (via ZIP archives), and the download and execution of additional tools from the attacker’s arsenal. The commands are indexed by 16-bit integers, starting with the value 0x27C3.
SimpleTea for Linux seems like an updated version of BadCall for Linux, rewritten from C to C++, as there are similarities in class names and function names between the two.
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular SimpleTea (ELF).
Known Synonyms |
---|
PondRAT |
SimplexTea |
Internal MISP references
UUID e8695701-8055-4b98-bcb6-e4bb7e0a3346
which can be used as unique global reference for SimpleTea (ELF)
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.simpletea - webarchive
- https://www.welivesecurity.com/2023/04/20/linux-malware-strengthens-links-lazarus-3cx-supply-chain-attack - webarchive
- https://www.virusbulletin.com/uploads/pdf/conference/vb2023/papers/Lazarus-campaigns-and-backdoors-in-2022-2023.pdf - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
SLAPSTICK
According to FireEye, SLAPSTICK is a Solaris PAM backdoor that grants a user access to the system with a secret, hard-coded password.
Internal MISP references
UUID fb3e0a1d-3a98-4cbd-ad7f-4bbb4b9a8351
which can be used as unique global reference for SLAPSTICK
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
SnappyTCP
According to PwC, SnappyTCP is a simple reverse shell for Linux/Unix systems, with variants for plaintext and TLS communication. SeaTurtle has used SnappyTCP at least between 2021 and 2023.
Internal MISP references
UUID 72e045be-eba2-4571-9c6e-7d35add3d2f8
which can be used as unique global reference for SnappyTCP
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.snappy_tcp - webarchive
- https://www.huntandhackett.com/blog/turkish-espionage-campaigns - webarchive
- https://www.pwc.com/gx/en/issues/cybersecurity/cyber-threat-intelligence/tortoise-and-malwahare.html - webarchive
- https://blog.strikeready.com/blog/pivoting-through-a-sea-of-indicators-to-spot-turtles/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
SoWaT
This is an implant used by APT31 on home routers to utilize them as ORBs.
Internal MISP references
UUID c2866996-d622-4ee2-b548-a6598836e5ae
which can be used as unique global reference for SoWaT
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.sowat - webarchive
- https://www.cert.ssi.gouv.fr/ioc/CERTFR-2021-IOC-003 - webarchive
- https://twitter.com/billyleonard/status/1417910729005490177 - webarchive
- https://blog.sekoia.io/my-teas-not-cold-an-overview-of-china-cyber-threat/ - webarchive
- https://twitter.com/bkMSFT/status/1417823714922610689 - webarchive
- https://imp0rtp3.wordpress.com/2021/11/25/sowat/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Spamtorte
Internal MISP references
UUID 7b9a9ea0-04d2-42ef-b72f-9d6476b9e0d0
which can be used as unique global reference for Spamtorte
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
SpeakUp
Internal MISP references
UUID 3ccd3143-c34d-4680-94b9-2cc4fa4f86fa
which can be used as unique global reference for SpeakUp
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Specter
Internal MISP references
UUID b9ed5797-b591-4ca9-ba77-ce86308e333a
which can be used as unique global reference for Specter
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.specter - webarchive
- https://blog.netlab.360.com/ghost-in-action-the-specter-botnet/ - webarchive
- https://blog.netlab.360.com/the-pitfall-of-threat-intelligence-whitelisting-specter-botnet-is-taking-over-top-legit-dns-domains-by-using-cloudns-service/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
SpectralBlur (ELF)
Internal MISP references
UUID a14e7ea4-668c-4990-a1a9-be99722f88f7
which can be used as unique global reference for SpectralBlur (ELF)
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Speculoos
Internal MISP references
UUID df23ae3a-e10d-4c49-b379-2ea2fd1925af
which can be used as unique global reference for Speculoos
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.speculoos - webarchive
- https://www.fireeye.com/blog/threat-research/2020/03/apt41-initiates-global-intrusion-campaign-using-multiple-exploits.html - webarchive
- https://www.secureworks.com/research/threat-profiles/bronze-atlas - webarchive
- https://unit42.paloaltonetworks.com/apt41-using-new-speculoos-backdoor-to-target-organizations-globally/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
SprySOCKS
Internal MISP references
UUID 3b5c485b-b6a6-4586-a7dc-9e23a3b0aa5a
which can be used as unique global reference for SprySOCKS
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
SSHDoor
Internal MISP references
UUID 275d65b9-0894-4c9b-a255-83daddb2589c
which can be used as unique global reference for SSHDoor
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.sshdoor - webarchive
- https://www.welivesecurity.com/2013/01/24/linux-sshdoor-a-backdoored-ssh-daemon-that-steals-passwords/ - webarchive
- https://www.trendmicro.com/en_in/research/24/e/router-roulette.html - webarchive
- http://contagiodump.blogspot.com/2013/02/linux-sshdoor-sample.html - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Stantinko
Internal MISP references
UUID e8c131df-ee3b-41d4-992d-71d3090d2d98
which can be used as unique global reference for Stantinko
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.stantinko - webarchive
- https://www.welivesecurity.com/2017/07/20/stantinko-massive-adware-campaign-operating-covertly-since-2012/ - webarchive
- https://www.welivesecurity.com/2020/03/19/stantinko-new-cryptominer-unique-obfuscation-techniques/ - webarchive
- https://www.welivesecurity.com/2019/11/26/stantinko-botnet-adds-cryptomining-criminal-activities/ - webarchive
- https://www.welivesecurity.com/2020/08/07/stadeo-deobfuscating-stantinko-and-more/ - webarchive
- https://www.intezer.com/blog/research/stantinkos-proxy-after-your-apache-server/ - webarchive
- https://www.intezer.com/blog/cloud-security/top-linux-cloud-threats-of-2020/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
STEELCORGI
According to FireEye, STEELCORGI is a packer for Linux ELF files that makes use of execution guardrails by sourcing decryption key material from environment variables.
Internal MISP references
UUID 21ff33b5-ef21-4263-8747-7de3d2dbdde6
which can be used as unique global reference for STEELCORGI
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.steelcorgi - webarchive
- https://yoroi.company/research/opening-steelcorgi-a-sophisticated-apt-swiss-army-knife/ - webarchive
- https://www.mandiant.com/resources/unc2891-overview - webarchive
- https://www.fireeye.com/blog/threat-research/2020/11/live-off-the-land-an-overview-of-unc1945.html - webarchive
- https://yoroi.company/research/shadows-from-the-past-threaten-italian-enterprises/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Sunless
Internal MISP references
UUID d03fa69b-53a4-4f61-b800-87e4246d2656
which can be used as unique global reference for Sunless
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
sustes miner
Sustes Malware doesn’t infect victims by itself (it’s not a worm) but it is spread over exploitation and brute-force activities with special focus on IoT and Linux servers. The initial infection stage comes from a custom wget directly on the victim machine followed by a simple /bin/bash mr.sh. The script is a simple bash script which drops and executes additional software.
Internal MISP references
UUID 5c117b01-826b-4656-b6ca-8b18b6e6159f
which can be used as unique global reference for sustes miner
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Suterusu
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Suterusu.
Known Synonyms |
---|
HCRootkit |
Internal MISP references
UUID d2748a0c-8739-4006-95c4-bdf6350d7fa9
which can be used as unique global reference for Suterusu
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Sword2033
Internal MISP references
UUID 9c1a32c7-45b4-4d3a-9d15-300b353f32a7
which can be used as unique global reference for Sword2033
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Symbiote
A malware capable of capturing credentials and enabling backdoor access, implemented as a userland rootkit. It uses three methods for hiding its network activity, by hooking and hijacking 1) fopen/fopen64, 2) eBPF, 3) a set of libpcap functions.
Internal MISP references
UUID 4339d876-768c-4cdf-941f-3f55a08aafca
which can be used as unique global reference for Symbiote
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.symbiote - webarchive
- https://blogs.blackberry.com/en/2022/06/symbiote-a-new-nearly-impossible-to-detect-linux-threat - webarchive
- https://www.trendmicro.com/en_us/research/23/g/detecting-bpfdoor-backdoor-variants-abusing-bpf-filters.html - webarchive
- https://www.intezer.com/blog/incident-response/orbit-new-undetected-linux-threat/ - webarchive
- https://cybergeeks.tech/how-to-analyze-linux-malware-a-case-study-of-symbiote - webarchive
- https://cybergeeks.tech/how-to-analyze-linux-malware-a-case-study-of-symbiote/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
SysJoker (ELF)
Internal MISP references
UUID c4b681ec-f5b5-433a-9314-07e06f739ba2
which can be used as unique global reference for SysJoker (ELF)
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.sysjoker - webarchive
- https://blogs.vmware.com/security/2022/03/%e2%80%afsysjoker-an-analysis-of-a-multi-os-rat.html - webarchive
- https://www.bleepingcomputer.com/news/security/new-sysjoker-backdoor-targets-windows-macos-and-linux/ - webarchive
- https://www.intezer.com/blog/malware-analysis/new-backdoor-sysjoker/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Sysrv-hello (ELF)
Cryptojacking botnet
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Sysrv-hello (ELF).
Known Synonyms |
---|
Sysrv |
Internal MISP references
UUID d471083a-c8e1-4d9b-907e-685c9a75c1f9
which can be used as unique global reference for Sysrv-hello (ELF)
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.sysrvhello - webarchive
- https://www.vmware.com/content/dam/digitalmarketing/vmware/en/pdf/docs/vmw-exposing-malware-in-linux-based-multi-cloud-environments.pdf - webarchive
- https://www.lacework.com/sysrv-hello-expands-infrastructure/ - webarchive
- https://www.riskiq.com/blog/external-threat-management/sysrv-hello-cryptojacking-botnet/ - webarchive
- https://darktrace.com/blog/worm-like-propagation-of-sysrv-hello-crypto-jacking-botnet - webarchive
- https://dfir.ch/posts/sysrv/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
TeamTNT
Since Fall 2019, Team TNT is a well known threat actor which targets *nix based systems and misconfigured Docker container environments. It has constantly evolved its capabilities for its cloud-based cryptojacking operations. They have shifted their focus on compromising Kubernetes Clusters.
Internal MISP references
UUID 24695f84-d3af-477e-92dd-c05c9536ebf5
which can be used as unique global reference for TeamTNT
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.teamtnt - webarchive
- https://www.vmware.com/content/dam/digitalmarketing/vmware/en/pdf/docs/vmw-exposing-malware-in-linux-based-multi-cloud-environments.pdf - webarchive
- https://www.cadosecurity.com/post/team-tnt-the-first-crypto-mining-worm-to-steal-aws-credentials - webarchive
- https://www.anomali.com/blog/inside-teamtnts-impressive-arsenal-a-look-into-a-teamtnt-server - webarchive
- https://www.aquasec.com/blog/fileless-malware-container-security/ - webarchive
- https://unit42.paloaltonetworks.com/atoms/adept-libra/ - webarchive
- https://blog.aquasec.com/teamtnt-campaign-against-docker-kubernetes-environment - webarchive
- https://documents.trendmicro.com/assets/white_papers/wp-tracking-the-activities-of-teamTNT.pdf - webarchive
- https://www.cyberark.com/resources/threat-research-blog/conti-group-leaked - webarchive
- https://unit42.paloaltonetworks.com/atoms/thieflibra/ - webarchive
- https://www.trendmicro.com/en_ae/research/21/k/teamtnt-upgrades-arsenal-refines-focus-on-kubernetes-and-gpu-env.html - webarchive
- https://unit42.paloaltonetworks.com/hildegard-malware-teamtnt/ - webarchive
- https://www.aquasec.com/blog/teamtnt-reemerged-with-new-aggressive-cloud-campaign/ - webarchive
- https://www.lacework.com/teamtnt-builds-botnet-from-chinese-cloud-servers/ - webarchive
- https://www.cadosecurity.com/2020/08/17/teamtnt-the-first-crypto-mining-worm-to-steal-aws-credentials/ - webarchive
- https://www.intezer.com/wp-content/uploads/2021/09/TeamTNT-Cryptomining-Explosion.pdf - webarchive
- https://www.aquasec.com/blog/threat-alert-anatomy-of-silentbobs-cloud-attack/ - webarchive
- https://www.intezer.com/blog/cloud-security/top-linux-cloud-threats-of-2020/ - webarchive
- https://www.cadosecurity.com/teamtnt-script-employed-to-grab-aws-credentials/ - webarchive
- https://cybersecurity.att.com/blogs/labs-research/teamtnt-with-new-campaign-aka-chimaera - webarchive
- https://cybersecurity.att.com/blogs/labs-research/teamtnt-delivers-malware-with-new-detection-evasion-tool - webarchive
- https://www.aquasec.com/blog/container-attacks-on-redis-servers/ - webarchive
- https://www.trendmicro.com/en_us/research/21/l/more-tools-in-the-arsenal-how-teamtnt-used-compromised-docker-hu.html - webarchive
- https://tolisec.com/active-crypto-mining-operation-by-teamtnt/ - webarchive
- https://www.uptycs.com/blog/team-tnt-deploys-malicious-docker-image-on-docker-hub-with-pentesting-tools - webarchive
- https://www.intezer.com/blog/malware-analysis/teamtnt-cryptomining-explosion/ - webarchive
- https://www.aquasec.com/blog/container-security-tnt-container-attack/ - webarchive
- https://sysdig.com/blog/teamtnt-aws-credentials/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
TheMoon
Internal MISP references
UUID ed098719-797b-4cb3-a73c-65b6d08ebdfa
which can be used as unique global reference for TheMoon
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.themoon - webarchive
- https://blog.lumen.com/a-new-phase-of-themoon/ - webarchive
- https://www.fortinet.com/blog/threat-research/themoon-a-p2p-botnet-targeting-home-routers - webarchive
- https://blog.lumen.com/the-darkside-of-themoon - webarchive
- https://www.sans.org/reading-room/whitepapers/malicious/analyzing-backdoor-bot-mips-platform-35902 - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
TNTbotinger
Internal MISP references
UUID 00319b53-e31c-4623-a3ac-9a18bc52bf36
which can be used as unique global reference for TNTbotinger
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Torii
Internal MISP references
UUID a874575e-0ad7-464d-abb6-8f4b7964aa92
which can be used as unique global reference for Torii
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
TripleCross
According to its author, TripleCross is a Linux eBPF rootkit that demonstrates the offensive capabilities of the eBPF technology.
Internal MISP references
UUID a462c60d-a7f9-4a05-aaa1-be415870310e
which can be used as unique global reference for TripleCross
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Trump Bot
Internal MISP references
UUID feb6a5f6-32f9-447d-af9c-08e499457883
which can be used as unique global reference for Trump Bot
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
TSCookie
Internal MISP references
UUID 592f7cc6-1e07-4d83-8082-aef027e9f1e2
which can be used as unique global reference for TSCookie
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.tscookie - webarchive
- https://www.ironnet.com/blog/china-cyber-attacks-the-current-threat-landscape - webarchive
- https://jsac.jpcert.or.jp/archive/2020/pdf/JSAC2020_0_JPCERT_en.pdf - webarchive
- https://www.macnica.net/file/mpressioncss_ta_report_2019_4.pdf - webarchive
- https://twitter.com/ESETresearch/status/1382054011264700416 - webarchive
- https://blogs.jpcert.or.jp/en/2020/03/elf-tscookie.html - webarchive
- https://www.macnica.net/file/mpressioncss_ta_report_2019_2_nopw.pdf - webarchive
- https://www.macnica.net/pdf/mpressioncss_ta_report_2019_4_en.pdf - webarchive
- https://www.intezer.com/blog/cloud-security/top-linux-cloud-threats-of-2020/ - webarchive
- https://summit.fireeye.com/content/dam/fireeye-www/summit/cds-2019/presentations/cds19-executive-s08-achievement-unlocked.pdf - webarchive
- https://www.cyberandramen.net/home/blacktech-doesnt-miss-a-step-a-quick-analysis-of-a-busy-2020 - webarchive
- https://www.slideshare.net/codeblue_jp/cb19-cyber-threat-landscape-in-japan-revealing-threat-in-the-shadow-by-chi-en-shen-ashley-oleg-bondarenko - webarchive
- https://jp.security.ntt/resources/EN-BlackTech_2021.pdf - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
tsh
Internal MISP references
UUID 95a07de2-0e17-48a7-b935-0c1c0c0e39af
which can be used as unique global reference for tsh
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Tsunami (ELF)
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Tsunami (ELF).
Known Synonyms |
---|
Amnesia |
Muhstik |
Radiation |
Internal MISP references
UUID 21540126-d0bb-42ce-9b93-341fedb94cac
which can be used as unique global reference for Tsunami (ELF)
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.tsunami - webarchive
- https://blogs.juniper.net/en-us/security/muhstik-gang-targets-redis-servers - webarchive
- https://www.cadosecurity.com/analysis-of-initial-in-the-wild-attacks-exploiting-log4shell-log4j-cve-2021-44228/ - webarchive
- https://www.lacework.com/blog/muhstik-takes-aim-at-confluence-cve-2021-26084/ - webarchive
- https://www.blackberry.com/content/dam/blackberry-com/asset/enterprise/pdf/direct/report-bb-2021-threat-report.pdf - webarchive
- https://blog.aquasec.com/new-malware-in-the-cloud-by-teamtnt - webarchive
- http://researchcenter.paloaltonetworks.com/2017/04/unit42-new-iotlinux-malware-targets-dvrs-forms-botnet/ - webarchive
- https://blog.netlab.360.com/public-cloud-threat-intelligence-202203/ - webarchive
- https://sysdig.com/blog/muhstik-malware-botnet-analysis/ - webarchive
- https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/log4j-vulnerabilities-attacks - webarchive
- https://www.fortinet.com/blog/threat-research/recent-attack-uses-vulnerability-on-confluence-server - webarchive
- https://www.intezer.com/wp-content/uploads/2021/09/TeamTNT-Cryptomining-Explosion.pdf - webarchive
- https://medium.com/s2wblog/logs-of-log4shell-cve-2021-44228-log4j-is-ubiquitous-en-809064312039 - webarchive
- https://www.aquasec.com/blog/muhstik-malware-targets-message-queuing-services-applications/ - webarchive
- https://blog.aquasec.com/fileless-malware-container-security - webarchive
- https://www.akamai.com/blog/security-research/2024-php-exploit-cve-one-day-after-disclosure - webarchive
- https://blog.aquasec.com/8220-gang-confluence-vulnerability-cve-2022-26134 - webarchive
- https://www.aquasec.com/blog/threat-alert-anatomy-of-silentbobs-cloud-attack/ - webarchive
- https://www.cadosecurity.com/teamtnt-script-employed-to-grab-aws-credentials/ - webarchive
- https://asec.ahnlab.com/en/54647/ - webarchive
- http://get.cyberx-labs.com/radiation-report - webarchive
- https://www.lacework.com/meet-muhstik-iot-botnet-infecting-cloud-servers/ - webarchive
- https://securelist.com/an-overview-of-targeted-attacks-and-apts-on-linux/98440/ - webarchive
- https://www.bleepingcomputer.com/news/security/log4shell-exploits-now-used-mostly-for-ddos-botnets-cryptominers/ - webarchive
- https://tolisec.com/multi-vector-minertsunami-botnet-with-ssh-lateral-movement/ - webarchive
- https://threatpost.com/muhstik-botnet-exploits-highly-critical-drupal-bug/131360/ - webarchive
- https://www.aquasec.com/blog/container-security-tnt-container-attack/ - webarchive
- https://www.ibm.com/downloads/cas/WMDZOWK6?social_post=5483919673&linkId=131648775 - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Turla RAT
Internal MISP references
UUID 1b62a421-c0db-4425-bcb2-a4925d5d33e0
which can be used as unique global reference for Turla RAT
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Umbreon
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Umbreon.
Known Synonyms |
---|
Espeon |
Internal MISP references
UUID 637000f7-4363-44e0-b795-9cfb7a3dc460
which can be used as unique global reference for Umbreon
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.umbreon - webarchive
- http://blog.trendmicro.com/trendlabs-security-intelligence/pokemon-themed-umbreon-linux-rootkit-hits-x86-arm-systems/ - webarchive
- http://contagiodump.blogspot.com/2018/03/rootkit-umbreon-umreon-x86-arm-samples.html - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Unidentified Linux 001
According to Cybereason, these scripts have been used in an ongoing campaign exploiting a widespread vulnerability in the Exim MTA: CVE-2019-10149. This attack leverages a week-old vulnerability to gain remote command execution on the target machine, search the Internet for other machines to infect, and initiates a crypto miner.
Internal MISP references
UUID b5b59d9f-f9e2-4201-a017-f2bae0470808
which can be used as unique global reference for Unidentified Linux 001
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Unidentified ELF 004
Implant used by APT31 on compromised SOHO infrastructure, tries to camouflage as a tool ("unifi-video") related to Ubiquiti UniFi surveillance cameras.
Internal MISP references
UUID 44a57915-2ec0-476f-9f20-b11082f5b5a4
which can be used as unique global reference for Unidentified ELF 004
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Unidentified 005 (Sidecopy)
Internal MISP references
UUID d49402b3-9f2a-4d9a-ae09-b1509da2e8fd
which can be used as unique global reference for Unidentified 005 (Sidecopy)
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Unidentified ELF 006 (Tox Backdoor)
Enables remote execution of scripts on a host, communicates via Tox.
Internal MISP references
UUID 61a36688-0a4f-4899-8b17-ca0d5ff7e800
which can be used as unique global reference for Unidentified ELF 006 (Tox Backdoor)
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Hive (Vault 8)
Internal MISP references
UUID 721fa6d1-da73-4dd4-9154-a60ff4607467
which can be used as unique global reference for Hive (Vault 8)
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Vermilion Strike (ELF)
Internal MISP references
UUID a4ded098-be7b-4852-adfd-8971ace583f1
which can be used as unique global reference for Vermilion Strike (ELF)
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.vermilion_strike - webarchive
- https://www.vmware.com/content/dam/digitalmarketing/vmware/en/pdf/docs/vmw-exposing-malware-in-linux-based-multi-cloud-environments.pdf - webarchive
- https://www.intezer.com/blog/malware-analysis/vermilionstrike-reimplementation-cobaltstrike/ - webarchive
- https://notes.netbytesec.com/2021/09/discovering-linux-elf-beacon-of-cobalt_18.html - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
VPNFilter
Internal MISP references
UUID 5ad30da2-2645-4893-acd9-3f8e0fbb5500
which can be used as unique global reference for VPNFilter
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.vpnfilter - webarchive
- https://www.sophos.com/en-us/medialibrary/PDFs/technical-papers/sophos-VPN-Filter-analysis-v2.pdf?la=en - webarchive
- https://blog.talosintelligence.com/2018/06/vpnfilter-update.html?m=1 - webarchive
- https://blog.talosintelligence.com/2022/02/threat-advisory-cyclops-blink.html - webarchive
- https://www.trendmicro.com/en_us/research/21/a/vpnfilter-two-years-later-routers-still-compromised-.html - webarchive
- https://msrc-blog.microsoft.com/2019/08/05/corporate-iot-a-path-to-intrusion/ - webarchive
- https://www.tesorion.nl/en/resources/pdfstore/Report-OSINT-Russia-Ukraine-Conflict-Cyberaspect.pdf - webarchive
- https://www.lacework.com/blog/mirai-goes-stealth-tls-iot-malware/ - webarchive
- https://www.cisa.gov/uscert/sites/default/files/publications/AA22-110A_Joint_CSA_Russian_State-Sponsored_and_Criminal_Cyber_Threats_to_Critical_Infrastructure_4_20_22_Final.pdf - webarchive
- https://www.sentinelone.com/labs/acidrain-a-modem-wiper-rains-down-on-europe/ - webarchive
- https://blog.trendmicro.com/trendlabs-security-intelligence/vpnfilter-affected-devices-still-riddled-with-19-vulnerabilities - webarchive
- https://services.google.com/fh/files/misc/apt44-unearthing-sandworm.pdf - webarchive
- https://www.cisa.gov/uscert/ncas/alerts/aa22-054a - webarchive
- https://www.gov.uk/government/news/uk-exposes-series-of-russian-cyber-attacks-against-olympic-and-paralympic-games - webarchive
- https://www.ncsc.gov.uk/news/joint-advisory-shows-new-sandworm-malware-cyclops-blink-replaces-vpnfilter - webarchive
- https://blog.talosintelligence.com/2022/02/current-executive-guidance-for-ongoing.html - webarchive
- https://cyberpeaceinstitute.org/ukraine-timeline-of-cyberattacks - webarchive
- https://i.blackhat.com/USA-19/Thursday/us-19-Doerr-The-Enemy-Within-Modern-Supply-Chain-Attacks.pdf - webarchive
- https://securelist.com/vpnfilter-exif-to-c2-mechanism-analysed/85721/ - webarchive
- https://www.symantec.com/blogs/threat-intelligence/vpnfilter-iot-malware - webarchive
- https://blog.talosintelligence.com/2018/09/vpnfilter-part-3.html - webarchive
- https://www.justice.gov/opa/pr/justice-department-announces-actions-disrupt-advanced-persistent-threat-28-botnet-infected - webarchive
- https://blog.talosintelligence.com/2019/05/one-year-later-vpnfilter-catastrophe.html - webarchive
- https://www.cisa.gov/uscert/ncas/alerts/aa22-110a - webarchive
- https://blog.talosintelligence.com/2018/05/VPNFilter.html - webarchive
- https://ti.qianxin.com/uploads/2020/02/13/cb78386a082f465f259b37dae5df4884.pdf - webarchive
- https://www.cisa.gov/uscert/sites/default/files/publications/AA22-054A%20New%20Sandworm%20Malware%20Cyclops%20Blink%20Replaces%20VPN%20Filter.pdf - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
WatchBog
According to Intezer, this is a spreader module used by WatchBog. It is a dynamically linked ELF executable, compiled with Cython. C&C adresses are fetched from Pastebin. C&C communication references unique identification keys per victim. It contains a BlueKeep scanner, reporting positively scanned hosts to the C&C server (RC4 encrypted within SSL/TLS). It contains 5 exploits targeting Jira, Exim, Solr, Jenkins and Nexus Repository Manager 3.
Internal MISP references
UUID aa00d8c9-b479-4d05-9887-cd172a11cfc9
which can be used as unique global reference for WatchBog
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
WellMail
Internal MISP references
UUID 93ffafbd-a8af-4164-b3ab-9b21e6d09232
which can be used as unique global reference for WellMail
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.wellmail - webarchive
- https://www.ncsc.gov.uk/files/Advisory-APT29-targets-COVID-19-vaccine-development.pdf - webarchive
- https://www.intezer.com/wp-content/uploads/2021/02/Intezer-2020-Go-Malware-Round-Up.pdf - webarchive
- https://www.ironnet.com/blog/russian-cyber-attack-campaigns-and-actors - webarchive
- https://www.pwc.co.uk/issues/cyber-security-services/insights/wellmail.html - webarchive
- https://us-cert.cisa.gov/ncas/analysis-reports/ar20-198c - webarchive
- https://blog.talosintelligence.com/2020/08/attribution-puzzle.html - webarchive
- https://www.intezer.com/blog/cloud-security/top-linux-cloud-threats-of-2020/ - webarchive
- https://securelist.com/apt-trends-report-q3-2020/99204/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
elf.wellmess
Internal MISP references
UUID b0046a6e-3b8b-45ad-a357-dabc46aba7de
which can be used as unique global reference for elf.wellmess
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.wellmess - webarchive
- https://www.blackberry.com/content/dam/blackberry-com/asset/enterprise/pdf/direct/report-old-dogs-new-tricks.pdf - webarchive
- https://www.ncsc.gov.uk/files/Advisory-APT29-targets-COVID-19-vaccine-development.pdf - webarchive
- https://www.intezer.com/wp-content/uploads/2021/02/Intezer-2020-Go-Malware-Round-Up.pdf - webarchive
- https://www.pwc.co.uk/issues/cyber-security-services/insights/cleaning-up-after-wellmess.html - webarchive
- https://www.ironnet.com/blog/russian-cyber-attack-campaigns-and-actors - webarchive
- https://www.pwc.co.uk/issues/cyber-security-services/insights/wellmess-analysis-command-control.html - webarchive
- https://securelist.com/an-overview-of-targeted-attacks-and-apts-on-linux/98440/ - webarchive
- https://services.global.ntt/en-us/insights/blog/the-layered-infrastructure-operated-by-apt29 - webarchive
- https://blog.talosintelligence.com/2020/08/attribution-puzzle.html - webarchive
- https://www.blackberry.com/content/dam/blackberry-com/asset/enterprise/pdf/direct/report-bb-2021-threat-report.pdf - webarchive
- https://blogs.jpcert.or.jp/en/2018/07/malware-wellmes-9b78.html - webarchive
- https://us-cert.cisa.gov/ncas/alerts/aa21-116a - webarchive
- https://securelist.com/apt-trends-report-q2-2020/97937/ - webarchive
- https://community.riskiq.com/article/541a465f/description - webarchive
- https://us-cert.cisa.gov/sites/default/files/publications/AA21-116A_Russian_Foreign_Intelligence_Service_Cyber_Operations_508C.pdf - webarchive
- https://www.botconf.eu/wp-content/uploads/2018/12/2018-Y-Ishikawa-S-Nagano-Lets-go-with-a-Go-RAT-_final.pdf - webarchive
- https://www.pwc.co.uk/cyber-security/pdf/pwc-cyber-threats-2020-a-year-in-retrospect.pdf - webarchive
- https://www.intezer.com/blog/cloud-security/top-linux-cloud-threats-of-2020/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
WHIRLPOOL
Internal MISP references
UUID be3a5211-45a8-496a-974f-6ef14f44af3d
which can be used as unique global reference for WHIRLPOOL
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
WhiteRabbit
Internal MISP references
UUID 901b88e6-4759-4aa6-b4d1-9f7da53c2adf
which can be used as unique global reference for WhiteRabbit
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.whiterabbit - webarchive
- https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/Ransom.Win32.WHITERABBIT.YACAET - webarchive
- https://www.bleepingcomputer.com/news/security/march-2023-broke-ransomware-attack-records-with-459-incidents/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Winnti (ELF)
Internal MISP references
UUID d6c5211e-506d-415c-b886-0ced529399a1
which can be used as unique global reference for Winnti (ELF)
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.winnti - webarchive
- https://asec.ahnlab.com/en/55785/ - webarchive
- https://attack.mitre.org/groups/G0096 - webarchive
- https://medium.com/chronicle-blog/winnti-more-than-just-windows-and-gates-e4f03436031a - webarchive
- https://blog.exatrack.com/melofee/ - webarchive
- https://intezer.com/blog/linux/elf-malware-analysis-101-linux-threats-no-longer-an-afterthought - webarchive
- https://go.recordedfuture.com/hubfs/reports/cta-2023-0808.pdf - webarchive
- https://www.secureworks.com/research/threat-profiles/bronze-atlas - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Wirenet (ELF)
Internal MISP references
UUID 47a8fedb-fd60-493a-9b7d-082bdb85621e
which can be used as unique global reference for Wirenet (ELF)
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
X-Agent (ELF)
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular X-Agent (ELF).
Known Synonyms |
---|
chopstick |
fysbis |
splm |
Internal MISP references
UUID a8404a31-968a-47e8-8434-533ceaf84c1f
which can be used as unique global reference for X-Agent (ELF)
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.xagent - webarchive
- https://download.bitdefender.com/resources/media/materials/white-papers/en/Bitdefender_In-depth_analysis_of_APT28%E2%80%93The_Political_Cyber-Espionage.pdf - webarchive
- https://www.secureworks.com/research/threat-profiles/iron-twilight - webarchive
- https://securelist.com/an-overview-of-targeted-attacks-and-apts-on-linux/98440/ - webarchive
- https://contagiodump.blogspot.de/2017/02/russian-apt-apt28-collection-of-samples.html - webarchive
- https://www.crowdstrike.com/blog/bears-midst-intrusion-democratic-national-committee/ - webarchive
- http://www.welivesecurity.com/wp-content/uploads/2016/10/eset-sednit-part-2.pdf - webarchive
- http://researchcenter.paloaltonetworks.com/2016/02/a-look-into-fysbis-sofacys-linux-backdoor/ - webarchive
- https://unit42.paloaltonetworks.com/a-look-into-fysbis-sofacys-linux-backdoor/ - webarchive
- https://securelist.com/a-slice-of-2017-sofacy-activity/83930/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Xanthe
Internal MISP references
UUID 55b4d75f-adcc-47df-81cf-6c93ccb54a56
which can be used as unique global reference for Xanthe
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.xanthe - webarchive
- https://blog.talosintelligence.com/2020/12/xanthe-docker-aware-miner.html - webarchive
- https://www.cadosecurity.com/abcbot-an-evolution-of-xanthe/ - webarchive
- https://www.ibm.com/downloads/cas/WMDZOWK6?social_post=5483919673&linkId=131648775 - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Xaynnalc
Internal MISP references
UUID 32b95dc7-03a6-45ab-a991-466208dd92d2
which can be used as unique global reference for Xaynnalc
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Xbash
Internal MISP references
UUID ee54fc1e-c574-4836-8cdb-992ac38cef32
which can be used as unique global reference for Xbash
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
xdr33
According to 360 netlab, this backdoor was derived from the leaked CIA Hive project. It propagates via a vulnerability in F5 and communicates using SSL with a forged Kaspersky certificate.
Internal MISP references
UUID c7b1cc91-7464-436e-ac40-3b06c98400a5
which can be used as unique global reference for xdr33
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
XOR DDoS
Linux DDoS C&C Malware
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular XOR DDoS.
Known Synonyms |
---|
XORDDOS |
Internal MISP references
UUID 7f9df618-4bd1-44a1-ad88-e5930373aac4
which can be used as unique global reference for XOR DDoS
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.xorddos - webarchive
- https://blog.checkpoint.com/wp-content/uploads/2015/10/sb-report-threat-intelligence-groundhog.pdf - webarchive
- https://www.lacework.com/groundhog-botnet-rapidly-infecting-cloud/ - webarchive
- https://www.intezer.com/blog/malware-analysis/new-linux-backdoor-redxor-likely-operated-by-chinese-nation-state-actor/ - webarchive
- https://www.blackberry.com/us/en/pdfviewer?file=/content/dam/blackberry-com/asset/enterprise/pdf/direct/report-bb-decade-of-the-rats.pdf - webarchive
- https://www.microsoft.com/security/blog/2022/05/19/rise-in-xorddos-a-deeper-look-at-the-stealthy-ddos-malware-targeting-linux-devices/ - webarchive
- https://bartblaze.blogspot.com/2015/09/notes-on-linuxxorddos.html - webarchive
- https://www.fireeye.com/blog/threat-research/2015/02/anatomy_of_a_brutef.html - webarchive
- https://blog.trendmicro.com/trendlabs-security-intelligence/xorddos-kaiji-botnet-malware-variants-target-exposed-docker-servers/ - webarchive
- https://en.wikipedia.org/wiki/Xor_DDoS - webarchive
- http://blog.malwaremustdie.org/2014/09/mmd-0028-2014-fuzzy-reversing-new-china.html - webarchive
- https://blog.nsfocusglobal.com/threats/vulnerability-analysis/analysis-report-of-the-xorddos-malware-family/ - webarchive
- https://www.virusbulletin.com/uploads/pdf/conference/vb2015/KalnaiHorejsi-VB2015.pdf - webarchive
- https://www.ibm.com/downloads/cas/WMDZOWK6?social_post=5483919673&linkId=131648775 - webarchive
- https://www.botconf.eu/wp-content/uploads/2015/12/OK-P13-Liu-Ya-Automatically-Classify-Unknown-Bots-by-The-Register-Messages.pdf - webarchive
- https://blog.avast.com/2015/01/06/linux-ddos-trojan-hiding-itself-with-an-embedded-rootkit/ - webarchive
- https://www.crowdstrike.com/blog/linux-targeted-malware-increased-by-35-percent-in-2021/ - webarchive
- https://maxkersten.nl/binary-analysis-course/analysis-scripts/ghidra-script-to-decrypt-a-string-array-in-xor-ddos/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Zergeca
Zergeca is a DDoS-botnet and backdoor written in Golang. It uses modified UPX for packing, with the magic number 0x30219101 instead of "UPX!". It is being distributed via weak telnet passwords and known vulnerabilities.
Internal MISP references
UUID a660eeda-910a-4df5-86ba-f17d8ac93c31
which can be used as unique global reference for Zergeca
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
ZeroBot
ZeroBot is a Go-based botnet that spreads primarily through IoT and web application vulnerabilities. It is offered as malware as a service (MaaS) and infrastructure overlaps with DDoS-for-hire services seized by the FBI in December 2022.
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular ZeroBot.
Known Synonyms |
---|
ZeroStresser |
Internal MISP references
UUID 458c583b-4353-4104-bee8-9e68cb77f151
which can be used as unique global reference for ZeroBot
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
ZHtrap
Internal MISP references
UUID d070ff73-ad14-4f6b-951f-1645009bdf80
which can be used as unique global reference for ZHtrap
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Zollard
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Zollard.
Known Synonyms |
---|
darlloz |
Internal MISP references
UUID 9218630d-0425-4b18-802c-447a9322990d
which can be used as unique global reference for Zollard
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
ZuoRAT
According to Black Lotus Labs, ZuoRAT is a MIPS file compiled for SOHO routers that can enumerate a host and internal LAN, capture packets being transmitted over the infected device and perform person-in-the-middle attacks (DNS and HTTPS hijacking based on predefined rules).
Internal MISP references
UUID c4b0a7cd-b349-44a1-94ca-3d5a4ac288b2
which can be used as unique global reference for ZuoRAT
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
AutoCAD Downloader
Small downloader composed as a Fast-AutoLoad LISP (FAS) module for AutoCAD.
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular AutoCAD Downloader.
Known Synonyms |
---|
Acad.Bursted |
Duxfas |
Internal MISP references
UUID fb22d876-c6b5-4634-a468-5857088d605c
which can be used as unique global reference for AutoCAD Downloader
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
COOKIESNATCH
According to Google, this is a cookie stealer
Internal MISP references
UUID 1b2d02d7-aa83-4101-ab10-2767b59c9c75
which can be used as unique global reference for COOKIESNATCH
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
DualToy (iOS)
Internal MISP references
UUID f7c1675f-b38a-4511-9ac4-6e475b3815e6
which can be used as unique global reference for DualToy (iOS)
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
GuiInject
Internal MISP references
UUID d9215579-eee0-4e50-9157-dba7c3214769
which can be used as unique global reference for GuiInject
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
lightSpy
Internal MISP references
UUID 8a1b524b-8fc9-4b1d-805d-c0407aff00d7
which can be used as unique global reference for lightSpy
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/ios.lightspy - webarchive
- https://hunt.io/blog/tracking-lightspy-certificates-as-windows-into-adversary-behavior - webarchive
- https://documents.trendmicro.com/assets/Tech-Brief-Operation-Poisoned-News-Hong-Kong-Users-Targeted-with-Mobile-Malware-via-Local-News-Links.pdf - webarchive
- https://www.threatfabric.com/blogs/lightspy-mapt-mobile-payment-system-attack - webarchive
- https://blog.trendmicro.com/trendlabs-security-intelligence/operation-poisoned-news-hong-kong-users-targeted-with-mobile-malware-via-local-news-links/ - webarchive
- https://securelist.com/ios-exploit-chain-deploys-lightspy-malware/96407/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Phenakite
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Phenakite.
Known Synonyms |
---|
Dakkatoni |
Internal MISP references
UUID 7ba7488c-b153-4949-8391-bcf6c4b057bd
which can be used as unique global reference for Phenakite
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
PoisonCarp
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular PoisonCarp.
Known Synonyms |
---|
INSOMNIA |
Internal MISP references
UUID 7982cc15-f884-40ca-8a82-a452b9c340c7
which can be used as unique global reference for PoisonCarp
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/ios.poisoncarp - webarchive
- https://googleprojectzero.blogspot.com/2019/08/implant-teardown.html - webarchive
- https://citizenlab.ca/2019/09/poison-carp-tibetan-groups-targeted-with-1-click-mobile-exploits/ - webarchive
- https://blog.trendmicro.com/trendlabs-security-intelligence/new-android-spyware-actionspy-revealed-via-phishing-attacks-from-earth-empusa/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Postlo
Internal MISP references
UUID 25bff9ad-20dc-4746-a174-e54fcdd8f0c1
which can be used as unique global reference for Postlo
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
TriangleDB
Internal MISP references
UUID 25754894-018b-4bed-aab6-c676fac23a77
which can be used as unique global reference for TriangleDB
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/ios.triangledb - webarchive
- https://media.ccc.de/v/37c3-11859-operation_triangulation_what_you_get_when_attack_iphones_of_researchers - webarchive
- https://securelist.com/operation-triangulation-catching-wild-triangle/110916/ - webarchive
- https://securelist.com/operation-triangulation-the-last-hardware-mystery/111669/ - webarchive
- https://securelist.com/triangulation-validators-modules/110847/ - webarchive
- https://securelist.com/triangledb-triangulation-implant/110050/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
VALIDVICTOR
According to Google, this reconnaissance payload uses a profiling framework drawing canvas to identify the target’s exact iPhone model, a technique used by many other actors. The iPhone model is sent back to the C2 along with screen size, whether or not a touch screen is present, and a unique identifier per initial GET request (e.g., 1lwuzddaxoom5ylli37v90kj). The server replies with either an AES encrypted next stage or 0, indicating that no payload is available for this device. The payload makes another request to the exploit server with gcr=1 as a parameter to get the AES decryption key from the C2.
Internal MISP references
UUID 16c0e484-7d03-46f4-870a-297d5397d693
which can be used as unique global reference for VALIDVICTOR
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
WireLurker (iOS)
The iOS malware that is installed over USB by osx.wirelurker
Internal MISP references
UUID bb340271-023c-4283-9d22-123317824a11
which can be used as unique global reference for WireLurker (iOS)
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
X-Agent (iOS)
Internal MISP references
UUID 430b9f30-5e37-49c8-b4e7-21589f120d89
which can be used as unique global reference for X-Agent (iOS)
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
AdWind
Part of Malware-as-service platform Used as a generic name for Java-based RAT Functionality - collect general system and user information - terminate process -log keystroke -take screenshot and access webcam - steal cache password from local or web forms - download and execute Malware - modify registry - download components - Denial of Service attacks - Acquire VPN certificates
Initial infection vector 1. Email to JAR files attached 2. Malspam URL to downlaod the malware
Persistence - Runkey - HKCU\Software\Microsoft\Windows\current version\run
Hiding Uses attrib.exe
Notes on Adwind The malware is not known to be proxy aware
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular AdWind.
Known Synonyms |
---|
AlienSpy |
Frutas |
JBifrost |
JSocket |
Sockrat |
UNRECOM |
Internal MISP references
UUID 8eb9d4aa-257a-45eb-8c65-95c18500171c
which can be used as unique global reference for AdWind
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/jar.adwind - webarchive
- https://marcoramilli.com/2018/08/20/interesting-hidden-threat-since-years/ - webarchive
- https://dissectingmalware.blogspot.com/2018/08/export-jratadwind-config-with-x32dbg.html - webarchive
- https://www.fortinet.com/blog/threat-research/new-jrat-adwind-variant-being-spread-with-package-delivery-scam.html - webarchive
- https://blog.talosintelligence.com/2018/09/adwind-dodgesav-dde.html - webarchive
- https://threatresearch.ext.hp.com/javascript-malware-dispensing-rats-into-the-wild/ - webarchive
- https://blogs.seqrite.com/evolution-of-jrat-java-malware/ - webarchive
- https://www.securityinbits.com/malware-analysis/interesting-tactic-by-ratty-adwind-distribution-of-jar-appended-to-signed-msi/ - webarchive
- https://gist.github.com/herrcore/8336975475e88f9bc539d94000412885 - webarchive
- https://research.checkpoint.com/malware-against-the-c-monoculture/ - webarchive
- https://www.zscaler.com/blogs/research/compromised-wordpress-sites-used-distribute-adwind-rat - webarchive
- http://blog.trendmicro.com/trendlabs-security-intelligence/spam-remote-access-trojan-adwind-jrat - webarchive
- https://www.trendmicro.com/content/dam/trendmicro/global/en/research/21/i/ssl-tls-technical-brief/ssl-tls-technical-brief.pdf - webarchive
- http://malware-traffic-analysis.net/2017/07/04/index.html - webarchive
- https://www.spamhaus.org/news/images/botnet-report-2020-q2/2020-q2-spamhaus-botnet-threat-report.pdf - webarchive
- https://citizenlab.ca/2015/12/packrat-report/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Adzok
Internal MISP references
UUID 90cb8ee6-52e6-4d8d-8f45-f04b9aec1f6c
which can be used as unique global reference for Adzok
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Banload
F-Secure observed Banload variants silently downloading malicious files from a remote server, then installing and executing the files.
Internal MISP references
UUID 30a61fa9-4bd1-427d-9382-ff7c33bd7043
which can be used as unique global reference for Banload
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/jar.banload - webarchive
- https://www.microsoft.com/en-us/wdsi/threats/malware-encyclopedia-description?name=TrojanDownloader%3AWin32%2FBanload - webarchive
- https://www.welivesecurity.com/wp-content/uploads/2015/05/CPL-Malware-in-Brasil-zx02m.pdf - webarchive
- https://colin.guru/index.php?title=Advanced_Banload_Analysis - webarchive
- https://www.trendmicro.de/cloud-content/us/pdfs/security-intelligence/white-papers/wp-cpl-malware.pdf - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Blue Banana RAT
Internal MISP references
UUID c51bbc9b-0906-4ac5-8026-d6b8b7b23e71
which can be used as unique global reference for Blue Banana RAT
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
CrossRAT
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular CrossRAT.
Known Synonyms |
---|
Trupto |
Internal MISP references
UUID bae3a6c7-9e58-47f2-8749-a194675e1c84
which can be used as unique global reference for CrossRAT
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
DynamicRAT
DynamicRAT is a malware that is spread via email attachments and compromises the security of computer systems. Once running on a device, DynamicRAT establishes a persistent presence and gives attackers complete remote control. Its features include sensitive data exfiltration, hardware control, remote action, and the ability to perform DDoS attacks. In addition, DynamicRAT uses evasion and persistence techniques to evade detection and analysis by security solutions.
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular DynamicRAT.
Known Synonyms |
---|
DYNARAT |
Internal MISP references
UUID 28539c3d-89a4-4dd6-85f5-f4c95808c0b7
which can be used as unique global reference for DynamicRAT
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
EpicSplit RAT
EpicSplit RAT is a multiplatform Java RAT that is capable of running shell commands, downloading, uploading, and executing files, manipulating the file system, establishing persistence, taking screenshots, and manipulating keyboard and mouse events. EpicSplit is typically obfuscated with the commercial Allatori Obfuscator software. One unique feature of the malware is that TCP messages sent by EpicSplit RAT to its C2 are terminated with the string "packet" as a packet delimiter.
Internal MISP references
UUID 90b304a2-452a-4c74-ae8d-80d9ace881a4
which can be used as unique global reference for EpicSplit RAT
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
FEimea RAT
Internal MISP references
UUID 3724d5d0-860d-4d1e-92a1-0a7089ca2bb3
which can be used as unique global reference for FEimea RAT
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
IceRat
According to Karsten Hahn, this malware is actually written in JPHP, but can be treated similar to .class files produced by Java. IceRat has been observed to carry out information stealing and mining.
Internal MISP references
UUID ac83a481-2ab4-42c2-a8b6-a4aec96e1c4b
which can be used as unique global reference for IceRat
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
JavaDispCash
JavaDispCash is a piece of malware designed for ATMs. The compromise happens by using the JVM attach-API on the ATM's local application and the goal is to remotely control its operation. The malware's primary feature is the ability to dispense cash. The malware also spawns a local port (65413) listening for commands from the attacker which needs to be located in the same internal network.
Internal MISP references
UUID 71286008-9794-4dcc-a571-164195390c39
which can be used as unique global reference for JavaDispCash
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
JavaLocker
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular JavaLocker.
Known Synonyms |
---|
JavaEncrypt Ransomware |
Internal MISP references
UUID 4bdddf41-8d5e-468d-905d-8c6667a5d47f
which can be used as unique global reference for JavaLocker
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
jRAT
jRAT, also known as Jacksbot, is a RAT with history, written in Java. It has support for macOS, Linux, Windows and various BSD. It also has functionality to participate in DDoS-attacks as well as to perform click fraud. Note that the Adwind family often is mistakenly labeled as jRAT, because of of a red hering reference to jrat.io.
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular jRAT.
Known Synonyms |
---|
Jacksbot |
Internal MISP references
UUID f2a9f583-b4dd-4669-8808-49c8bbacc376
which can be used as unique global reference for jRAT
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/jar.jrat - webarchive
- https://www.eff.org/files/2018/01/29/operation-manul.pdf - webarchive
- https://www.intego.com/mac-security-blog/new-multiplatform-backdoor-jacksbot-discovered - webarchive
- https://blog.trendmicro.com/trendlabs-security-intelligence/jacksbot-has-some-dirty-tricks-up-its-sleeves/ - webarchive
- https://research.checkpoint.com/malware-against-the-c-monoculture/ - webarchive
- https://maskop9.wordpress.com/2019/02/06/analysis-of-jacksbot-backdoor/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
jSpy
Internal MISP references
UUID ff24997d-1f17-4f00-b9b8-b3392146540f
which can be used as unique global reference for jSpy
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Mineping
DDoS for Minecraft servers.
Internal MISP references
UUID f3f38528-a8bf-496a-af46-7eb60a9ec6c3
which can be used as unique global reference for Mineping
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Octopus Scanner
Internal MISP references
UUID 8ae996fe-50bb-479b-925c-e6b1e51a9b40
which can be used as unique global reference for Octopus Scanner
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Pronsis Loader
According to TrustWave, this is a loader leveraging JPHP, which was observed fetching Latrodectus and Lumma.
Internal MISP references
UUID 80005653-bfbb-4a37-a8bf-87f8dc9e4047
which can be used as unique global reference for Pronsis Loader
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/jar.pronsis_loader - webarchive
- https://cloud.google.com/blog/topics/threat-intelligence/russian-espionage-influence-ukrainian-military-recruits-anti-mobilization-narratives?hl=en - webarchive
- https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/pronsis-loader-a-jphp-driven-malware-diverging-from-d3fck-loader/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Qarallax RAT
According to SpiderLabs, in May 2015 the "company" Quaverse offered a RAT known as Quaverse RAT or QRAT. At around May 2016, this QRAT evolved into another RAT which became known as Qarallax RAT, because its C2 is at qarallax.com. Quaverse also offers a service to encrypt Java payloads (Qrypter), and thus qrypted payloads are sometimes confused with Quaverse RATs (QRAT / Qarallax RAT).
Internal MISP references
UUID e7852eb9-9de9-43d3-9f7e-3821f3b2bf41
which can be used as unique global reference for Qarallax RAT
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Qealler
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Qealler.
Known Synonyms |
---|
Pyrogenic Infostealer |
Internal MISP references
UUID d16a3a1f-e244-4715-a67f-61ba30901efb
which can be used as unique global reference for Qealler
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/jar.qealler - webarchive
- https://github.com/jeFF0Falltrades/Malware-Writeups/blob/master/Qealler/Qealler-Unloaded.pdf - webarchive
- https://www.securityinbits.com/malware-analysis/unpacking/unpacking-pyrogenic-qealler-using-java-agent-part-0x2/ - webarchive
- https://www.securityinbits.com/malware-analysis/pyrogenic-infostealer-static-analysis-part-0x1/ - webarchive
- https://www.zscaler.com/blogs/research/qealler-new-jar-based-information-stealer - webarchive
- https://www.cyberark.com/threat-research-blog/qealler-the-silent-java-credential-thief/ - webarchive
- https://www.herbiez.com/?p=1352 - webarchive
- https://www.securityinbits.com/malware-analysis/similarity-between-qealler-pyrogenic-variants-part-0x3/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
QRat
QRat, also known as Quaverse RAT, was introduced in May 2015 as undetectable (because of multiple layers of obfuscation). It offers the usual functionality (password dumper, file browser, keylogger, screen shots/streaming, ...), and it comes as a SaaS. For additional historical context, please see jar.qarallax.
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular QRat.
Known Synonyms |
---|
Quaverse RAT |
Internal MISP references
UUID ef385825-bfa1-4e8c-b368-522db78cf1bd
which can be used as unique global reference for QRat
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/jar.qrat - webarchive
- https://www.trustwave.com/Resources/SpiderLabs-Blog/Quaverse-RAT--Remote-Access-as-a-Service/ - webarchive
- https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/rats-and-spam-the-nodejs-qrat/ - webarchive
- https://www.digitrustgroup.com/java-rat-qrat/ - webarchive
- https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/updated-qnode-rat-downloader-distributed-as-trump-video-scandal/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Ratty
Ratty is an open source Java RAT, made available on GitHub and promoted heavily on HackForums. At some point in 2016 / 2017 the original author deleted his repository, but several clones exist.
Internal MISP references
UUID da032a95-b02a-4af2-b563-69f686653af4
which can be used as unique global reference for Ratty
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/jar.ratty - webarchive
- https://www.securityinbits.com/malware-analysis/interesting-tactic-by-ratty-adwind-distribution-of-jar-appended-to-signed-msi/ - webarchive
- https://threatresearch.ext.hp.com/javascript-malware-dispensing-rats-into-the-wild/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Sorillus RAT
Sorillus is a Java-based multifunctional remote access trojan (RAT) which targets Linux, macOS and Windows operating systems. While it was first created in 2019, interest in the tool has increased considerably in 2022. Beginning on January 18, 2022, different obfuscated client versions of the tool started to be uploaded to VirusTotal. Sorillus' features are described in detail on its website (hxxps://sorillus[.]com). The tool supposedly costs 49.99€ for lifetime access but is currently available at a discounted 19.99€. Conveniently, the Sorillus can be purchased via a variety of cryptocurrencies. The tool's creator and distributor, a YouTube user known as "Tapt", asserts that the tool is able to collect the following information from its target: - HardwareID - Username - Country - Language - Webcam - Headless - Operating system - Client Version
Internal MISP references
UUID 80694785-aeb6-4e05-a3e8-cb972993d769
which can be used as unique global reference for Sorillus RAT
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
STRRAT
STRRAT is a Java-based RAT, which makes extensive use of plugins to provide full remote access to an attacker, as well as credential stealing, key logging and additional plugins. The RAT has a focus on stealing credentials of browsers and email clients, and passwords via keylogging. It supports the following browsers and email clients: Firefox, Internet Explorer, Chrome, Foxmail, Outlook, Thunderbird.
Since Version 1.2 and above, STRRAT was infamous for its ransomware-like behavior of appending the file name extension .crimson to files. Version 1.5 is notably more obfuscated and modular than previous versions, but the backdoor functions mostly remain the same: collect browser passwords, run remote commands and PowerShell, log keystrokes, among others. Version 1.5 of STRRAT Malware includes a proper encryption routine, though currently pretty simple to revert.
Internal MISP references
UUID 6d1335d5-8351-4725-ad8a-07cabca4119e
which can be used as unique global reference for STRRAT
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/jar.strrat - webarchive
- https://threatresearch.ext.hp.com/wp-content/uploads/2021/10/HP-Wolf-Security-Threat-Insights-Report-Q3-2021.pdf - webarchive
- https://forensicitguy.github.io/strrat-attached-to-msi/ - webarchive
- https://umbrella.cisco.com/blog/cybersecurity-threat-spotlight-strrat-zloader-honeygain - webarchive
- https://any.run/cybersecurity-blog/strrat-malware-analysis-of-a-jar-archive/ - webarchive
- https://twitter.com/MsftSecIntel/status/1395138347601854465 - webarchive
- https://threatresearch.ext.hp.com/javascript-malware-dispensing-rats-into-the-wild/ - webarchive
- https://www.jaiminton.com/reverse-engineering/strrat - webarchive
- https://resources.securityscorecard.com/cybersecurity/analyze-java-malware-strrat#page=1 - webarchive
- https://isc.sans.edu/diary/rss/27798 - webarchive
- https://www.gdatasoftware.com/blog/strrat-crimson - webarchive
- https://github.com/microsoft/Microsoft-365-Defender-Hunting-Queries - webarchive
- https://www.jaiminton.com/reverse-engineering/strrat# - webarchive
- https://www.fortinet.com/blog/threat-research/vcurms-a-simple-and-functional-weapon - webarchive
- https://www.deepinstinct.com/blog/understanding-the-windows-javascript-threat-landscape - webarchive
- https://www.fortinet.com/blog/threat-research/new-strrat-rat-phishing-campaign - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
SupremeBot
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular SupremeBot.
Known Synonyms |
---|
BlazeBot |
Internal MISP references
UUID 651e37e0-1bf8-4024-ac1e-e7bda42470b0
which can be used as unique global reference for SupremeBot
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Verblecon
This malware seems to be used for attacks installing cryptocurrency miners on infected machines. Other indicators leads to the assumption that attackers may also use this malware for other purposes (e.g. stealing access tokens for Discord chat app). Symantec describes this malware as complex and powerful: The malware is loaded as a server-side polymorphic JAR file.
Internal MISP references
UUID 793565b4-666b-47a4-b15b-de9c80c75a51
which can be used as unique global reference for Verblecon
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
VersaMem
According to Lumen, a web shell used by Volt Typhoon.
Internal MISP references
UUID eb15c0ec-108e-4082-a0c1-ea41345b7db7
which can be used as unique global reference for VersaMem
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
AIRBREAK
AIRBREAK, a JavaScript-based backdoor which retrieves commands from hidden strings in compromised webpages.
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular AIRBREAK.
Known Synonyms |
---|
Orz |
Internal MISP references
UUID fd419da6-5c0d-461e-96ee-64397efac63b
which can be used as unique global reference for AIRBREAK
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/js.airbreak - webarchive
- https://www.fireeye.com/blog/threat-research/2018/07/chinese-espionage-group-targets-cambodia-ahead-of-elections.html - webarchive
- http://www.kahusecurity.com/posts/reflow_javascript_backdoor.html - webarchive
- https://www.secureworks.com/research/threat-profiles/bronze-mohawk - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Bateleur
Internal MISP references
UUID fb75a753-24ba-4b58-b7ed-2e39b0c68c65
which can be used as unique global reference for Bateleur
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/js.bateleur - webarchive
- https://cert.ssi.gouv.fr/uploads/20220427_NP_TLPWHITE_ANSSI_FIN7.pdf - webarchive
- https://www.crowdstrike.com/blog/carbon-spider-embraces-big-game-hunting-part-1/ - webarchive
- https://summit.fireeye.com/content/dam/fireeye-www/summit/cds-2018/presentations/cds18-technical-s05-att&cking-fin7.pdf - webarchive
- https://www.secureworks.com/research/threat-profiles/gold-niagara - webarchive
- https://www.proofpoint.com/us/threat-insight/post/fin7carbanak-threat-actor-unleashes-bateleur-jscript-backdoor - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
BeaverTail
BeaverTail is a JavaScript malware primarily distributed through NPM packages. It is designed for information theft and to load further stages of malware, specifically a multi-stage Python-based backdoor known as InvisibleFerret. BeaverTail targets cryptocurrency wallets and credit card information stored in the victim's web browsers. Its code is heavily obfuscated to evade detection. Threat actors can either upload malicious NPM packages containing BeaverTail to GitHub or inject BeaverTail code into legitimate NPM projects. Researchers have identified additional Windows and macOS variants, indicating that the BeaverTail malware family is likely still under development.
Internal MISP references
UUID da0fb7ce-d730-4ee8-bcc8-3da7eba8ad79
which can be used as unique global reference for BeaverTail
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/js.beavertail - webarchive
- https://www.securonix.com/blog/research-update-threat-actors-behind-the-devpopper-campaign-have-retooled-and-are-continuing-to-target-software-developers-via-social-engineering/ - webarchive
- https://security.macnica.co.jp/blog/2024/10/-contagious-interview.html - webarchive
- https://stacklok.com/blog/dependency-hijacking-dissecting-north-koreas-new-wave-of-defi-themed-open-source-attacks-targeting-developers - webarchive
- https://www.securonix.com/blog/analysis-of-devpopper-new-attack-campaign-targeting-software-developers-likely-associated-with-north-korean-threat-actors/ - webarchive
- https://mp.weixin.qq.com/s/84lUaNSGo4lhQlpnCVUHfQ - webarchive
- https://unit42.paloaltonetworks.com/two-campaigns-by-north-korea-bad-actors-target-job-hunters/ - webarchive
- https://www.zscaler.com/blogs/security-research/pyongyang-your-payroll-rise-north-korean-remote-workers-west - webarchive
- https://securitylabs.datadoghq.com/articles/tenacious-pungsan-dprk-threat-actor-contagious-interview/ - webarchive
- https://www.group-ib.com/blog/apt-lazarus-python-scripts/ - webarchive
- https://securityscorecard.com/blog/the-job-offer-that-wasnt-how-we-stopped-an-espionage-plot - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
BELLHOP
• BELLHOP is a JavaScript backdoor interpreted using the native Windows Scripting Host(WSH). After performing some basic host information gathering, the BELLHOP dropper downloads a base64-encoded blob of JavaScript to disk and sets up persistence in three ways: • Creating a Run key in the Registry • Creating a RunOnce key in the Registry • Creating a persistent named scheduled task • BELLHOP communicates using HTTP and HTTPS with primarily benign sites such as Google Docs and PasteBin.
Internal MISP references
UUID 7ebeb691-b979-4a88-94e1-dade780c6a7f
which can be used as unique global reference for BELLHOP
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/js.bellhop - webarchive
- https://www.fireeye.com/blog/threat-research/2018/08/fin7-pursuing-an-enigmatic-and-evasive-global-criminal-operation.html - webarchive
- https://cert.ssi.gouv.fr/uploads/20220427_NP_TLPWHITE_ANSSI_FIN7.pdf - webarchive
- https://summit.fireeye.com/content/dam/fireeye-www/summit/cds-2018/presentations/cds18-technical-s05-att&cking-fin7.pdf - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
CACTUSTORCH
According to the GitHub repo, CACTUSTORCH is a JavaScript and VBScript shellcode launcher. It will spawn a 32 bit version of the binary specified and inject shellcode into it.
Internal MISP references
UUID efbb5a7c-8c01-4aca-ac21-8dd614b256f7
which can be used as unique global reference for CACTUSTORCH
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/js.cactustorch - webarchive
- https://forensicitguy.github.io/analyzing-cactustorch-hta-cobaltstrike/ - webarchive
- https://www.codercto.com/a/46729.html - webarchive
- https://www.seqrite.com/documents/en/white-papers/Seqrite-WhitePaper-Operation-SideCopy.pdf - webarchive
- https://www.microsoft.com/security/blog/2020/09/24/gadolinium-detecting-empires-cloud/ - webarchive
- https://www.macnica.net/file/mpression_automobile.pdf - webarchive
- https://github.com/mdsecactivebreach/CACTUSTORCH - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
ChromeBack
GoSecure describes ChromeBack as a browser hijacker, redirecting traffic and serving advertisements to users.
Internal MISP references
UUID ec055670-4d25-4918-90c7-281fddf3a771
which can be used as unique global reference for ChromeBack
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
ClearFake
ClearFake is a malicious JavaScript framework deployed on compromised websites to deliver further malware using the drive-by download technique. The malware leverages social engineering to trick the user into running a fake web browser update.
Internal MISP references
UUID 8899bc6f-62e1-4732-988a-d5d64a5cf9bd
which can be used as unique global reference for ClearFake
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/js.clearfake - webarchive
- https://www.kroll.com/en/insights/publications/cyber/clearfake-update-tricks-victim-executing-malicious-powershell-code - webarchive
- https://rmceoin.github.io/malware-analysis/clearfake/ - webarchive
- https://blog.sekoia.io/clearfake-a-newcomer-to-the-fake-updates-threats-landscape/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
CryptoNight
WebAssembly-based crpyto miner.
Internal MISP references
UUID faa19699-a884-4cd3-a307-36492c8ee77a
which can be used as unique global reference for CryptoNight
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
CukieGrab
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular CukieGrab.
Known Synonyms |
---|
Roblox Trade Assist |
Internal MISP references
UUID d47ca107-3e03-4c25-88f9-8156426b7f60
which can be used as unique global reference for CukieGrab
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
DarkWatchman
Prevailion found this RAT written in JavaScript, which dynamically compiles an accompanying keylogger written in C# and uses a DGA for C&C.
Internal MISP references
UUID 4baf5a22-7eec-4ad8-8780-23a351d9b5f5
which can be used as unique global reference for DarkWatchman
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/js.darkwatchman - webarchive
- https://securityintelligence.com/x-force/new-hive0117-phishing-campaign-imitates-conscription-summons-deliver-darkwatchman-malware/ - webarchive
- https://www.prevailion.com/darkwatchman-new-fileness-techniques/ - webarchive
- https://securityintelligence.com/posts/hive00117-fileless-malware-delivery-eastern-europe/ - webarchive
- https://cyble.com/blog/sophisticated-darkwatchman-rat-spreads-through-phishing-sites/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
DNSRat
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular DNSRat.
Known Synonyms |
---|
DNSbot |
Internal MISP references
UUID a4b40d48-e40b-47f2-8e30-72342231503e
which can be used as unique global reference for DNSRat
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
doenerium
Open sourced javascript info stealer, with the capabilities of stealing crypto wallets, password, cookies and modify discord clients https://github.com/doener2323/doenerium
Internal MISP references
UUID dc446dbc-6f8a-48ee-9e90-10e679a003e1
which can be used as unique global reference for doenerium
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Enrume
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Enrume.
Known Synonyms |
---|
Ransom32 |
Internal MISP references
UUID d6e5f6b7-cafb-476d-958c-72debdabe013
which can be used as unique global reference for Enrume
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
EVILNUM (Javascript)
According proofpoint, EvilNum is a backdoor that can be used for data theft or to load additional payloads. The malware includes multiple interesting components to evade detection and modify infection paths based on identified antivirus software.
Internal MISP references
UUID b7deec7e-24f7-4f78-9d58-9b3c1e182ab3
which can be used as unique global reference for EVILNUM (Javascript)
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/js.evilnum - webarchive
- http://blog.nsfocus.net/agentvxapt-evilnum/ - webarchive
- https://mp.weixin.qq.com/s/REXBtbnI2zXj4H3u6ofMMw - webarchive
- https://www.zscaler.com/blogs/security-research/return-evilnum-apt-updated-ttps-and-new-targets - webarchive
- https://github.com/eset/malware-ioc/tree/master/evilnum - webarchive
- https://blog.prevailion.com/2020/05/phantom-in-command-shell5.html - webarchive
- https://securelist.com/deathstalker-mercenary-triumvirate/98177/ - webarchive
- http://www.pwncode.io/2018/05/javascript-based-bot-using-github-c.html - webarchive
- https://www.clearskysec.com/wp-content/uploads/2019/08/ClearSky-2019-H1-Cyber-Events-Summary-Report.pdf - webarchive
- https://www.welivesecurity.com/2020/07/09/more-evil-deep-look-evilnum-toolset/ - webarchive
- https://unit42.paloaltonetworks.com/cardinal-rat-sins-again-targets-israeli-fin-tech-firms/ - webarchive
- https://securelist.com/apt-trends-report-q3-2020/99204/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
FakeUpdateRU
FakeUpdateRU is a malicious JavaScript code injected into compromised websites to deliver further malware using the drive-by download technique. The malicious code displays a copy of the Google Chrome web browser download page and redirects the user to the download of a next-stage payload.
Internal MISP references
UUID 9106e280-febe-45a3-9cd1-cbffafc0c85b
which can be used as unique global reference for FakeUpdateRU
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
FAKEUPDATES
FAKEUPDATES is a downloader written in JavaScript that communicates via HTTP. Supported payload types include executables and JavaScript. It writes the payloads to disk prior to launching them. FAKEUPDATES has led to further compromise via additional malware families that include CHTHONIC, DRIDEX, EMPIRE, KOADIC, DOPPELPAYMER, and AZORULT.
FAKEUPDATES has been heavily used by UNC1543, a financially motivated group.
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular FAKEUPDATES.
Known Synonyms |
---|
FakeUpdate |
SocGholish |
Internal MISP references
UUID cff35ce3-8d6f-417b-ae6c-a9e6a60ee26c
which can be used as unique global reference for FAKEUPDATES
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/js.fakeupdates - webarchive
- https://blog.sucuri.net/2022/08/socgholish-5-years-of-massive-website-infections.html - webarchive
- https://experience.mandiant.com/trending-evil/p/1 - webarchive
- https://www.digitalinformationworld.com/2022/04/threatening-redirect-web-service.html - webarchive
- https://www.trendmicro.com/content/dam/trendmicro/global/en/research/22/d/thwarting-loaders-from-socgholish-to-blisters-lockbit-payload/iocs-thwarting-loaders-socgholish-blister.txt - webarchive
- https://www.sentinelone.com/labs/socgholish-diversifies-and-expands-its-malware-staging-infrastructure-to-counter-defenders/ - webarchive
- https://malasada.tech/the-landupdate808-fake-update-variant/ - webarchive
- https://decoded.avast.io/janrubin/parrot-tds-takes-over-web-servers-and-threatens-millions/ - webarchive
- https://www.rapid7.com/blog/post/2023/08/31/fake-update-utilizes-new-idat-loader-to-execute-stealc-and-lumma-infostealers/ - webarchive
- https://www.mandiant.com/resources/unc2165-shifts-to-evade-sanctions - webarchive
- https://x.com/GenThreatLabs/status/1840762181668741130 - webarchive
- https://blog.malwarebytes.com/threat-intelligence/2022/06/makemoney-malvertising-campaign-adds-fake-update-template/ - webarchive
- https://info.spamhaus.com/hubfs/Botnet%20Reports/Jan-Jun%202024%20Botnet%20Threat%20Update.pdf - webarchive
- https://www.mandiant.com/resources/they-come-in-the-night-ransomware-deployment-trends - webarchive
- https://www.menlosecurity.com/blog/increase-in-attack-socgholish - webarchive
- https://blog.checkpoint.com/research/november-2023s-most-wanted-malware-new-asyncrat-campaign-discovered-while-fakeupdates-re-entered-the-top-ten-after-brief-hiatus/ - webarchive
- https://www.cybereason.com/blog/threat-analysis-report-socgholish-and-zloader-from-fake-updates-and-installers-to-owning-your-systems - webarchive
- https://www.trendmicro.com/en_us/research/22/d/Thwarting-Loaders-From-SocGholish-to-BLISTERs-LockBit-Payload.html - webarchive
- https://killingthebear.jorgetesta.tech/actors/evil-corp - webarchive
- https://www.intrinsec.com/wp-content/uploads/2024/04/TLP-CLEAR-Matanbuchus-Co-Code-Emulation-and-Cybercrime-Infrastructure-Discovery-1.pdf - webarchive
- https://resource.redcanary.com/rs/003-YRU-314/images/2022_ThreatDetectionReport_RedCanary.pdf - webarchive
- https://twitter.com/MsftSecIntel/status/1522690116979855360 - webarchive
- https://www.microsoft.com/security/blog/2022/05/09/ransomware-as-a-service-understanding-the-cybercrime-gig-economy-and-how-to-protect-yourself - webarchive
- https://www.proofpoint.com/us/blog/threat-insight/ta569-socgholish-and-beyond - webarchive
- https://www.lac.co.jp/lacwatch/report/20220407_002923.html - webarchive
- https://expel.io/blog/incident-report-spotting-socgholish-wordpress-injection/ - webarchive
- https://blog.malwarebytes.com/threat-analysis/2018/04/fakeupdates-campaign-leverages-multiple-website-platforms/ - webarchive
- https://thehackernews.com/2022/07/microsoft-links-raspberry-robin-usb.html?_m=3n%2e009a%2e2800%2ejp0ao0cjb8%2e1shm - webarchive
- https://research.nccgroup.com/2022/08/19/back-in-black-unlocking-a-lockbit-3-0-ransomware-attack - webarchive
- https://info.spamhaus.com/hubfs/Botnet%20Reports/Q4%202023%20Botnet%20Threat%20Update.pdf - webarchive
- https://www.microsoft.com/en-us/security/blog/2022/10/27/raspberry-robin-worm-part-of-larger-ecosystem-facilitating-pre-ransomware-activity/ - webarchive
- http://www.microsoft.com/en-us/security/blog/2022/10/27/raspberry-robin-worm-part-of-larger-ecosystem-facilitating-pre-ransomware-activity/ - webarchive
- https://medium.com/walmartglobaltech/socgholish-campaigns-and-initial-access-kit-4c4283fea8ee - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
GootLoader
According to PCrisk, they discovered GootLoader malware while examining legitimate but compromised websites (mainly websites managed using WordPress). It was found that GootLoader is used to infect computers with additional malware. Cybercriminals using GootLoader seek to trick users into unknowingly downloading and executing the malware by disguising it as a document or other file.
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular GootLoader.
Known Synonyms |
---|
SLOWPOUR |
Internal MISP references
UUID 5b2569e5-aeb2-4708-889f-c6d598bd5e14
which can be used as unique global reference for GootLoader
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/js.gootloader - webarchive
- https://malasada.tech/gootloader-isnt-broken/ - webarchive
- https://gootloader.wordpress.com/2024/02/14/my-game-retired-latest-changes-to-gootloader/ - webarchive
- https://www.reliaquest.com/blog/gootloader-infection-credential-access/ - webarchive
- https://intel471.com/blog/threat-hunting-case-study-tracking-down-gootloader - webarchive
- https://x.com/MsftSecIntel/status/1836456406276342215 - webarchive
- https://experience.mandiant.com/trending-evil/p/1 - webarchive
- https://dinohacks.blogspot.com/2022/06/loading-gootloader.html - webarchive
- https://news.sophos.com/en-us/2021/08/12/gootloaders-mothership-controls-malicious-content/ - webarchive
- https://www.esentire.com/blog/gootloader-leads-to-cobalt-strike-and-hand-on-keyboard-activity - webarchive
- https://thedfirreport.com/2022/05/09/seo-poisoning-a-gootloader-story/ - webarchive
- https://blogs.blackberry.com/en/2022/07/gootloader-from-seo-poisoning-to-multi-stage-downloader - webarchive
- https://github.com/struppigel/hedgehog-tools/tree/main/gootloader - webarchive
- https://www.kroll.com/en/insights/publications/cyber/deep-dive-gootloader-malware-infection-chain - webarchive
- https://threatresearch.ext.hp.com/tips-for-automating-ioc-extraction-from-gootloader-a-changing-javascript-malware/ - webarchive
- https://labs.sentinelone.com/gootloader-initial-access-as-a-service-platform-expands-its-search-for-high-value-targets/ - webarchive
- https://www.trendmicro.com/en_us/research/23/a/gootkit-loader-actively-targets-the-australian-healthcare-indust.html - webarchive
- https://redcanary.com/wp-content/uploads/2022/05/Gootloader.pdf - webarchive
- https://gootloader.wordpress.com/2024/06/24/gootloaders-new-hideout-revealed-the-malware-hunt-in-wordpress-shadows/ - webarchive
- https://www.esentire.com/blog/gootloader-striking-with-a-new-infection-technique - webarchive
- https://www.mandiant.com/resources/blog/tracking-evolution-gootloader-operations - webarchive
- https://redcanary.com/blog/gootloader - webarchive
- https://web.archive.org/web/20230209123148/https://www.cybereason.com/hubfs/THREAT%20ALERT%20GootLoader%20-%20Large%20payload%20leading%20to%20compromise%20(BLOG).pdf - webarchive
- https://securityintelligence.com/x-force/gootbot-gootloaders-new-approach-to-post-exploitation/ - webarchive
- https://blog.nviso.eu/2022/07/20/analysis-of-a-trojanized-jquery-script-gootloader-unleashed/ - webarchive
- https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/gootloader-why-your-legal-document-search-may-end-in-misery/ - webarchive
- https://socradar.io/new-gootloader-variant-gootbot-changes-the-game-in-malware-tactics/ - webarchive
- https://gootloader.wordpress.com/2023/01/05/gootloader-command-control/ - webarchive
- https://gootloader.wordpress.com/2023/01/05/what-is-gootloader/ - webarchive
- https://news.sophos.com/en-us/2024/11/06/bengal-cat-lovers-in-australia-get-psspsspssd-in-google-driven-gootloader-campaign/ - webarchive
- https://thedfirreport.com/2024/02/26/seo-poisoning-to-domain-control-the-gootloader-saga-continues/ - webarchive
- https://www.googlecloudcommunity.com/gc/Community-Blog/Finding-Malware-Detecting-GOOTLOADER-with-Google-Security/ba-p/823766 - webarchive
- https://community.riskiq.com/article/f5d5ed38 - webarchive
- https://www.esentire.com/web-native-pages/gootloader-unloaded - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
grelos
grelos is a skimmer used for magecart-style attacks.
Internal MISP references
UUID 79580c0b-c390-4421-976a-629a5c11af95
which can be used as unique global reference for grelos
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Griffon
GRIFFON is a lightweight JavaScript validator-style implant without any persistence mechanism. The malware is designed for receiving modules to be executed in-memory and sending the results to C2s. The first module downloaded by the GRIFFON malware to the victim’s computer is an information-gathering JavaScript, which allows the cybercriminals to understand the context of the infected workstation.
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Griffon.
Known Synonyms |
---|
Harpy |
Internal MISP references
UUID 85c25380-69d7-4d7e-b279-6b6791fd40bd
which can be used as unique global reference for Griffon
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/js.griffon - webarchive
- https://www.microsoft.com/security/blog/2022/05/09/ransomware-as-a-service-understanding-the-cybercrime-gig-economy-and-how-to-protect-yourself - webarchive
- https://cert.ssi.gouv.fr/uploads/20220427_NP_TLPWHITE_ANSSI_FIN7.pdf - webarchive
- https://securelist.com/fin7-5-the-infamous-cybercrime-rig-fin7-continues-its-activities/90703/ - webarchive
- https://summit.fireeye.com/content/dam/fireeye-www/summit/cds-2018/presentations/cds18-technical-s05-att&cking-fin7.pdf - webarchive
- https://www.crowdstrike.com/blog/carbon-spider-embraces-big-game-hunting-part-1/ - webarchive
- https://www.deepinstinct.com/blog/understanding-the-windows-javascript-threat-landscape - webarchive
- https://www.microsoft.com/security/blog/2022/05/09/ransomware-as-a-service-understanding-the-cybercrime-gig-economy-and-how-to-protect-yourself/ - webarchive
- https://www.secureworks.com/research/threat-profiles/gold-niagara - webarchive
- https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/would-you-exchange-your-security-for-a-gift-card/ - webarchive
- https://www.crowdstrike.com/blog/carbon-spider-embraces-big-game-hunting-part-2/ - webarchive
- https://ti.qianxin.com/uploads/2020/02/13/cb78386a082f465f259b37dae5df4884.pdf - webarchive
- https://www.mandiant.com/resources/evolution-of-fin7 - webarchive
- https://www.crowdstrike.com/blog/carbon-spider-sprite-spider-target-esxi-servers-with-ransomware/?utm_campaign=blog&utm_medium=soc&utm_source=twtr&utm_content=sprout - webarchive
- https://twitter.com/ItsReallyNick/status/1059898708286939136 - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
inter
Internal MISP references
UUID 36b0f1a0-29a4-4ec5-bca2-18a241881d49
which can be used as unique global reference for inter
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Jeniva
Internal MISP references
UUID b0631a44-3264-429d-b8bc-3a27e27be305
which can be used as unique global reference for Jeniva
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Jetriz
Internal MISP references
UUID 9e6a0a54-8b55-4e78-a3aa-15d1946882e1
which can be used as unique global reference for Jetriz
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
jspRAT
Internal MISP references
UUID 71903afc-7129-4821-90e5-c490e4902de3
which can be used as unique global reference for jspRAT
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
KopiLuwak
Internal MISP references
UUID 2269d37b-87e9-460d-b878-b74a2f4c3537
which can be used as unique global reference for KopiLuwak
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/js.kopiluwak - webarchive
- https://securelist.com/shedding-skin-turlas-fresh-faces/88069/ - webarchive
- https://www.proofpoint.com/us/threat-insight/post/turla-apt-actor-refreshes-kopiluwak-javascript-backdoor-use-g20-themed-attack - webarchive
- https://securelist.com/tomiris-called-they-want-their-turla-malware-back/109552/ - webarchive
- https://www.mandiant.com/resources/blog/turla-galaxy-opportunity - webarchive
- https://blog.angelalonso.es/2017/10/analysis-of-malicious-doc-used-by-turla.html - webarchive
- https://securelist.com/blog/research/77429/kopiluwak-a-new-javascript-payload-from-turla/ - webarchive
- https://ti.qianxin.com/uploads/2020/02/13/cb78386a082f465f259b37dae5df4884.pdf - webarchive
- https://pdfhost.io/v/F0@QElMu2_MacProStorage_2017FinalBitdefenderWhitepaperNetrepserA4en_ENBitdefenderWhitepaperNetrepserA4en_ENindd.pdf - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
LNKR
The LNKR trojan is a malicious browser extension that will monitor the websites visited by the user, looking for pages with administrative privileges such as blog sites or web-based virtual learning environments. When the administrative user posts to the page, the infected extension will execute stored cross-site scripting attack and injects malicious JavaScript into the legitimate HTML of the page. This is used to redirect the second-party visitors of the site to both benign and malicious domains.
Internal MISP references
UUID 1a85acf3-4bda-49b4-9e50-1231f0b7340a
which can be used as unique global reference for LNKR
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/js.lnkr - webarchive
- https://krebsonsecurity.com/2020/03/the-case-for-limiting-your-browser-extensions/ - webarchive
- https://www.riskiq.com/blog/labs/lnkr-browser-extension/ - webarchive
- https://github.com/Zenexer/lnkr/blob/master/recon/extensions/fanagokoaogopceablgmpndejhedkjjb/README.md - webarchive
- https://github.com/Zenexer/lnkr - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
magecart
Magecart is a malware framework intended to steal credit card information from compromised eCommerce websites. Used in criminal activities, it's a sophisticated implant built on top of relays, command and controls and anonymizers used to steal eCommerce customers' credit card information. The first stage is typically implemented in Javascript included into a compromised checkout page. It copies data from "input fields" and send them to a relay which collects credit cards coming from a subset of compromised eCommerces and forwards them to Command and Control servers.
Internal MISP references
UUID f53e404b-0dcd-4116-91dd-cad94fc41936
which can be used as unique global reference for magecart
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/js.magecart - webarchive
- https://blog.sucuri.net/2020/06/evasion-tactics-in-hybrid-credit-card-skimmers.html - webarchive
- https://medium.com/reflectiz/csp-the-right-solution-for-the-web-skimming-pandemic-acb7a4414218 - webarchive
- https://www.zscaler.com/blogs/security-research/black-friday-scams-4-emerging-skimming-attacks-watch-holiday-season - webarchive
- https://maxkersten.nl/2020/02/17/following-the-tracks-of-magecart-12/ - webarchive
- https://www.pwc.co.uk/cyber-security/assets/cyber-threats-2019-retrospect.pdf - webarchive
- https://www.riskiq.com/blog/labs/magecart-group-12-olympics/ - webarchive
- https://blog.malwarebytes.com/threat-intelligence/2021/09/the-many-tentacles-of-magecart-group-8/ - webarchive
- https://blog.malwarebytes.com/threat-intelligence/2021/11/credit-card-skimmer-evades-virtual-machines/ - webarchive
- https://community.riskiq.com/article/5bea32aa - webarchive
- https://gallery.mailchimp.com/c35aef82661dad887b8162a4f/files/e24e8206-a157-4796-a8cb-2b7262cc76e8/CSIS_Threat_Matrix_H1_2019.pdf - webarchive
- https://blog.sucuri.net/2020/11/css-js-steganography-in-fake-flash-player-update-malware.html - webarchive
- https://www.reflectiz.com/the-gocgle-web-skimming-campaign/ - webarchive
- https://www.riskiq.com/blog/labs/magecart-group-4-always-advancing/ - webarchive
- https://scotthelme.co.uk/introducing-script-watch-detect-magecart-style-attacks-fast/?utm_source=dlvr.it&utm_medium=twitter - webarchive
- https://www.riskiq.com/blog/labs/magecart-nutribullet/ - webarchive
- https://community.riskiq.com/article/30f22a00 - webarchive
- https://maxkersten.nl/2020/01/20/ticket-resellers-infected-with-a-credit-card-skimmer/ - webarchive
- https://sansec.io/research/magecart-corona-lockdown - webarchive
- https://www.perimeterx.com/blog/analyzing_magecart_malware_from_zero_to_hero/ - webarchive
- https://blog.malwarebytes.com/threat-analysis/2019/06/magecart-skimmers-found-on-amazon-cloudfront-cdn/ - webarchive
- https://sansec.io/research/magento-2-persistent-parasite - webarchive
- https://blog.trendmicro.com/trendlabs-security-intelligence/us-local-government-services-targeted-by-new-magecart-credit-card-skimming-attack/ - webarchive
- https://medium.com/csis-techblog/inside-view-of-brazzzersff-infrastructure-89b9188fd145 - webarchive
- https://www.goggleheadedhacker.com/blog/post/14 - webarchive
- https://geminiadvisory.io/magecart-google-tag-manager/ - webarchive
- https://maxkersten.nl/2020/02/24/closing-in-on-magecart-12/ - webarchive
- https://sansec.io/labs/2020/01/25/magecart-hackers-arrested/ - webarchive
- https://blog.trendmicro.com/trendlabs-security-intelligence/magecart-skimming-attack-targets-mobile-users-of-hotel-chain-booking-websites/ - webarchive
- https://blog.trendmicro.com/trendlabs-security-intelligence/mirrorthief-group-uses-magecart-skimming-attack-to-hit-hundreds-of-campus-online-stores-in-us-and-canada/ - webarchive
- https://twitter.com/AffableKraut/status/1415425132080816133?s=20 - webarchive
- https://www.riskiq.com/blog/labs/magecart-ticketmaster-breach/ - webarchive
- https://marcoramilli.com/2020/02/19/uncovering-new-magecart-implant-attacking-ecommerce/ - webarchive
- https://blog.malwarebytes.com/threat-intelligence/2021/10/q-logger-skimmer-keeps-magecart-attacks-going/ - webarchive
- https://community.riskiq.com/article/743ea75b/description - webarchive
- https://go.recordedfuture.com/hubfs/reports/cta-2022-0719.pdf - webarchive
- https://blog.trendmicro.com/trendlabs-security-intelligence/fin6-compromised-e-commerce-platform-via-magecart-to-inject-credit-card-skimmers-into-thousands-of-online-shops/ - webarchive
- https://www.crowdstrike.com/blog/threat-actor-magecart-coming-to-an-ecommerce-store-near-you/ - webarchive
- https://blog.malwarebytes.com/threat-analysis/2020/06/web-skimmer-hides-within-exif-metadata-exfiltrates-credit-cards-via-image-files/ - webarchive
- https://geminiadvisory.io/wp-content/uploads/2020/07/Appendix-C-1.pdf - webarchive
- https://community.riskiq.com/article/fda1f967 - webarchive
- https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/injecting-magecart-into-magento-global-config/ - webarchive
- https://blog.malwarebytes.com/cybercrime/2019/04/github-hosted-magecart-skimmer-used-against-hundreds-of-e-commerce-sites/ - webarchive
- https://securelist.com/apt-trends-report-q2-2019/91897/ - webarchive
- https://www.reflectiz.com/ico-fines-ticketmaster-uk-1-25-million-for-security-failures-a-lesson-to-be-learned/ - webarchive
- https://blog.malwarebytes.com/cybercrime/2021/06/lil-skimmer-the-magecart-impersonator/ - webarchive
- https://community.riskiq.com/article/017cf2e6 - webarchive
- https://www.zdnet.com/article/web-skimmers-found-on-the-websites-of-intersport-claires-and-icing/ - webarchive
- https://twitter.com/MBThreatIntel/status/1416101496022724609 - webarchive
- https://community.riskiq.com/article/2efc2782 - webarchive
- https://www.riskiq.com/blog/labs/misconfigured-s3-buckets/ - webarchive
- https://geminiadvisory.io/keeper-magecart-group-infects-570-sites/ - webarchive
- https://www.riskiq.com/blog/labs/magecart-medialand/ - webarchive
- https://community.riskiq.com/article/14924d61 - webarchive
- https://sansec.io/research/north-korea-magecart - webarchive
- https://blog.sucuri.net/2021/07/magecart-swiper-uses-unorthodox-concatenation.html - webarchive
- https://blog.malwarebytes.com/cybercrime/2021/05/newly-observed-php-based-skimmer-shows-ongoing-magecart-group-12-activity/ - webarchive
- https://blog.sucuri.net/2020/07/skimmers-in-images-github-repos.html - webarchive
- https://twitter.com/AffableKraut/status/1385030485676544001 - webarchive
- https://resources.malwarebytes.com/files/2020/02/2020_State-of-Malware-Report.pdf - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
megaMedusa
MegaMedusa is NodeJS DDoS Machine Layer-7 provided by RipperSec Team.
Internal MISP references
UUID 8a51e636-13be-4bdc-a32f-2d832263ba5b
which can be used as unique global reference for megaMedusa
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
MiniJS
MiniJS is a very simple JavaScript-based first-stage backdoor. The backdoor is probably distributed via spearphishing email. Due to infrastructure overlap, the malware can be attributed to the actor Turla. Comparable JavaScript-based backdoor families of the actor are KopiLuwak and IcedCoffee.
Internal MISP references
UUID 5fd2f4f0-0591-45bb-a843-c194d5e294cd
which can be used as unique global reference for MiniJS
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
MintsLoader
According to Orange Cyberdefense, MintsLoader is a little-known, multi-stage malware loader that has been used since at least February 2023. It has been observed in widespread distribution campaigns between July and October 2024. The name comes from a very characteristic use of an URL parameter “1.php?s=mintsXX" (with XX being numbers).
MintsLoader primarily delivers malicious RAT or infostealing payloads such as AsyncRAT and Vidar through phishing emails, targeting organizations in Europe (Spain, Italy, Poland, etc.). Written in JavaScript and PowerShell, MintsLoader operates through a multi-step infection process involving several URLs and domains, most of which use a domain generation algorithm (DGA) with .top TLD.
Internal MISP references
UUID 0cd219f4-1f3b-4958-b678-173257abd67e
which can be used as unique global reference for MintsLoader
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
More_eggs
More_eggs is a JavaScript backdoor used by the Cobalt group. It attempts to connect to its C&C server and retrieve tasks to carry out, some of which are: - d&exec = download and execute PE file - gtfo = delete files/startup entries and terminate - more_eggs = download additional/new scripts - more_onion = run new script and terminate current script - more_power = run command shell commands
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular More_eggs.
Known Synonyms |
---|
SKID |
SpicyOmelette |
Internal MISP references
UUID 1c3009ff-b9a5-4ac1-859c-9b3b4a66a63f
which can be used as unique global reference for More_eggs
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/js.more_eggs - webarchive
- https://github.com/eset/malware-ioc/tree/master/evilnum - webarchive
- http://www.secureworks.com/research/threat-profiles/gold-kingswood - webarchive
- https://www.proofpoint.com/us/threat-insight/post/fake-jobs-campaigns-delivering-moreeggs-backdoor-fake-job-offers - webarchive
- https://asert.arbornetworks.com/double-the-infection-double-the-fun/ - webarchive
- https://www.esentire.com/web-native-pages/unmasking-venom-spider - webarchive
- https://twitter.com/Arkbird_SOLG/status/1301536930069278727 - webarchive
- https://reaqta.com/2018/03/spear-phishing-campaign-leveraging-msxsl/ - webarchive
- https://thehackernews.com/2024/06/moreeggs-malware-disguised-as-resumes.html - webarchive
- https://blog.talosintelligence.com/2018/07/multiple-cobalt-personality-disorder.html - webarchive
- https://securityintelligence.com/posts/more_eggs-anyone-threat-actor-itg08-strikes-again/ - webarchive
- https://go.crowdstrike.com/rs/281-OBQ-266/images/Report2020CrowdStrikeGlobalThreatReport.pdf - webarchive
- https://www.secureworks.com/research/threat-profiles/gold-kingswood - webarchive
- https://securityintelligence.com/posts/itg08-aka-fin6-partners-with-trickbot-gang-uses-anchor-framework/ - webarchive
- https://www.bitdefender.com/files/News/CaseStudies/study/262/Bitdefender-WhitePaper-An-APT-Blueprint-Gaining-New-Visibility-into-Financial-Threats-interactive.pdf - webarchive
- https://www.securonix.com/blog/threat-labs-security-advisory-new-ocxharvester-attack-campaign-leverages-modernized-more_eggs-suite/ - webarchive
- https://www.welivesecurity.com/2020/07/09/more-evil-deep-look-evilnum-toolset/ - webarchive
- https://www.secureworks.com/blog/cybercriminals-increasingly-trying-to-ensnare-the-big-financial-fish - webarchive
- https://blog.morphisec.com/cobalt-gang-2.0 - webarchive
- https://www.esentire.com/blog/hackers-spearphish-corporate-hiring-managers-with-poisoned-resumes-infecting-them-with-the-more-eggs-malware - webarchive
- https://mp.weixin.qq.com/s/REXBtbnI2zXj4H3u6ofMMw - webarchive
- https://expel.com/blog/more-eggs-and-some-linkedin-resume-spearphishing - webarchive
- https://quointelligence.eu/2020/07/golden-chickens-evolution-of-the-maas/ - webarchive
- https://sec0wn.blogspot.com/2023/03/how-do-you-like-dem-eggs-i-like-mine.html?m=1 - webarchive
- https://www.esentire.com/security-advisories/hackers-spearphish-professionals-on-linkedin-with-fake-job-offers-infecting-them-with-malware-warns-esentire - webarchive
- https://attack.mitre.org/software/S0284/ - webarchive
- https://blog.trendmicro.com/trendlabs-security-intelligence/backdoor-carrying-emails-set-sights-on-russian-speaking-businesses/ - webarchive
- https://blog.trendmicro.com/trendlabs-security-intelligence/cobalt-spam-runs-use-macros-cve-2017-8759-exploit/ - webarchive
- https://ti.qianxin.com/uploads/2020/02/13/cb78386a082f465f259b37dae5df4884.pdf - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
NanHaiShu
NanHaiShu is a remote access tool and JScript backdoor used by Leviathan. NanHaiShu has been used to target government and private-sector organizations that have relations to the South China Sea dispute.
Internal MISP references
UUID 3e46af39-52e8-442f-aff1-38eeb90336fc
which can be used as unique global reference for NanHaiShu
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/js.nanhaishu - webarchive
- https://community.spiceworks.com/topic/1028936-stealthy-cyberespionage-campaign-attacks-with-social-engineering - webarchive
- https://www.proofpoint.com/us/threat-insight/post/leviathan-espionage-actor-spearphishes-maritime-and-defense-targets - webarchive
- https://www.f-secure.com/documents/996508/1030745/nanhaishu_whitepaper.pdf - webarchive
- https://attack.mitre.org/software/S0228/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
NodeRAT
Internal MISP references
UUID e3b0ed5c-4e6a-4f50-bef2-1f7112aa31ed
which can be used as unique global reference for NodeRAT
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/js.node_rat - webarchive
- https://blogs.jpcert.or.jp/ja/2019/02/tick-activity.html - webarchive
- https://www.virusbulletin.com/virusbulletin/2020/05/vb2019-paper-apt-cases-exploiting-vulnerabilities-regionspecific-software/ - webarchive
- https://jsac.jpcert.or.jp/archive/2020/pdf/JSAC2020_0_JPCERT_en.pdf - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
OFFODE
According to the author, this is a project that will give understanding of bypassing Multi Factor Authentication (MFA) of an outlook account. It is build in node.js and uses playwright for the automation in the backend.
Internal MISP references
UUID 0be6d248-382a-48b8-9a52-dba08aaa891e
which can be used as unique global reference for OFFODE
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
ostap
Ostap is a commodity JScript downloader first seen in campaigns in 2016. It has been observed being delivered in ACE archives and VBA macro-enabled Microsoft Office documents. Recent versions of Ostap query WMI to check for a blacklist of running processes:
AgentSimulator.exe anti-virus.EXE BehaviorDumper BennyDB.exe ctfmon.exe fakepos_bin FrzState2k gemu-ga.exe (Possible misspelling of Qemu hypervisor’s guest agent, qemu-ga.exe) ImmunityDebugger.exe KMS Server Service.exe ProcessHacker procexp Proxifier.exe python tcpdump VBoxService VBoxTray.exe VmRemoteGuest vmtoolsd VMware2B.exe VzService.exe winace Wireshark
If a blacklisted process is found, the malware terminates.
Ostap has been observed delivering other malware families, including Nymaim, Backswap and TrickBot.
Internal MISP references
UUID a3b93781-c51c-4ccb-a856-804331470a9d
which can be used as unique global reference for ostap
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/js.ostap - webarchive
- https://www.bromium.com/deobfuscating-ostap-trickbots-javascript-downloader/ - webarchive
- https://github.com/cryptogramfan/Malware-Analysis-Scripts/blob/master/deobfuscate_ostap.py - webarchive
- https://marcoramilli.com/2021/01/09/c2-traffic-patterns-personal-notes/ - webarchive
- https://labs.bitdefender.com/2020/03/5-times-more-coronavirus-themed-malware-reports-during-march/?utm_campaign=twitter&utm_medium=twitter&utm_source=twitter - webarchive
- https://www.intrinsec.com/deobfuscating-hunting-ostap/ - webarchive
- https://malfind.com/index.php/2021/11/24/from-the-archive-1-ostap-dropper-deobfuscation-and-analysis/ - webarchive
- https://blog.trendmicro.com/trendlabs-security-intelligence/latest-trickbot-campaign-delivered-via-highly-obfuscated-js-file/ - webarchive
- https://www.trendmicro.com/content/dam/trendmicro/global/en/research/21/i/ssl-tls-technical-brief/ssl-tls-technical-brief.pdf - webarchive
- https://www.cert.pl/en/news/single/ostap-malware-analysis-backswap-dropper/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
ParaSiteSnatcher
Internal MISP references
UUID 9af9557c-04fc-4231-85c4-d1fb30c53cb6
which can be used as unique global reference for ParaSiteSnatcher
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Parrot TDS
This malicious code written in JavaScript is used as Traffic Direction System (TDS). This TDS showes similarities to the Prometheus TDS. According to DECODED Avast.io this TDS has been active since October 2021.
Internal MISP references
UUID dbefad0a-29d3-49d3-b925-116598182dee
which can be used as unique global reference for Parrot TDS
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
PeaceNotWar
PeaceNotWar was integrated into the nodejs module node-ipc as a piece of malware/protestware with wiper characteristics. It targets machines with a public IP address located in Russia and Belarus (using geolocation) and overwrites files recursively using a heart emoji.
Internal MISP references
UUID 6c304481-024e-4f34-af06-6235edacfdcc
which can be used as unique global reference for PeaceNotWar
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/js.peacenotwar - webarchive
- https://gist.github.com/MidSpike/f7ae3457420af78a54b38a31cc0c809c - webarchive
- https://www.vice.com/en/article/dypeek/open-source-sabotage-node-ipc-wipe-russia-belraus-computers - webarchive
- https://www.bleepingcomputer.com/news/security/big-sabotage-famous-npm-package-deletes-files-to-protest-ukraine-war/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
PindOS
Internal MISP references
UUID 6af1eb7a-bc54-43af-9e15-7187a5f250c4
which can be used as unique global reference for PindOS
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Powmet
Internal MISP references
UUID 9521ceb0-039d-412c-a38b-7bd9ddfc772e
which can be used as unique global reference for Powmet
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
QNodeService
According to Trend Micro, this is a Node.js based malware, that can download/upload/execute files, steal credentials from Chrome/Firefox browsers, and perform file management, among other things. It targets Windows and has components for both 32 and 64bit.
Internal MISP references
UUID 52d9260f-f090-4e79-b0b3-0c89f5db6bc6
which can be used as unique global reference for QNodeService
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
QUICKCAFE
QUICKCAFE is an encrypted JavaScript downloader for QUICKRIDE.POWER that exploits the ActiveX M2Soft vulnerabilities. QUICKCAFE is obfuscated using JavaScript Obfuscator.
Internal MISP references
UUID 475766d2-1e99-4d81-89e4-0d0df4a562d0
which can be used as unique global reference for QUICKCAFE
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
scanbox
Internal MISP references
UUID 0a13a546-91a2-4de0-9bbb-71c9233ce6fa
which can be used as unique global reference for scanbox
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/js.scanbox - webarchive
- https://www.alienvault.com/blogs/labs-research/scanbox-a-reconnaissance-framework-used-on-watering-hole-attacks - webarchive
- https://www.proofpoint.com/us/blog/threat-insight/chasing-currents-espionage-south-china-sea - webarchive
- https://www.proofpoint.com/us/blog/threat-insight/ta413-leverages-new-friarfox-browser-extension-target-gmail-accounts-global - webarchive
- https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/attacker-tracking-users-seeking-pakistani-passport/ - webarchive
- http://resources.infosecinstitute.com/scanbox-framework/ - webarchive
- https://www.secureworks.com/research/threat-profiles/bronze-mohawk - webarchive
- https://www.volexity.com/blog/2019/09/02/digital-crackdown-large-scale-surveillance-and-exploitation-of-uyghurs/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
SQLRat
SQLRat campaigns typically involve a lure document that includes an image overlayed by a VB Form trigger. Once a user has double-clicked the embedded image, the form executes a VB setup script. The script writes files to the path %appdata%\Roaming\Microsoft\Templates\, then creates two task entries triggered to run daily. The scripts are responsible for deobfuscating and executing the main JavaScript file mspromo.dot. The file uses a character insertion obfuscation technique, making it appear to contain Chinese characters. After deobfuscating the file, the main JavaScript is easily recognizable. It contains a number of functions designed to drop files and execute scripts on a host system. The SQLRat script is designed to make a direct SQL connection to a Microsoft database controlled by the attackers and execute the contents of various tables.
Internal MISP references
UUID d51cb8f8-cca3-46ce-a05d-052df44aef40
which can be used as unique global reference for SQLRat
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/js.sqlrat - webarchive
- https://cert.ssi.gouv.fr/uploads/20220427_NP_TLPWHITE_ANSSI_FIN7.pdf - webarchive
- https://ti.qianxin.com/uploads/2020/02/13/cb78386a082f465f259b37dae5df4884.pdf - webarchive
- https://www.flashpoint-intel.com/blog/fin7-revisited-inside-astra-panel-and-sqlrat-malware/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Starfighter (Javascript)
According to the author, this is a JavaScript based Empire launcher that runs with its own embedded powershell host to not be dependent on local powershell availability.
Internal MISP references
UUID f6c80748-1cce-4f6b-92e9-f8a04ff3464a
which can be used as unique global reference for Starfighter (Javascript)
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Swid
Internal MISP references
UUID d4be22cf-497d-46a0-8d57-30d10d9486e3
which can be used as unique global reference for Swid
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
HTML5 Encoding
Internal MISP references
UUID c7ab9e5a-0ec9-481e-95ec-ad08f06cf985
which can be used as unique global reference for HTML5 Encoding
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/js.turla_ff_ext - webarchive
- https://kindredsec.com/2019/08/12/an-overview-of-public-platform-c2s/ - webarchive
- https://www.welivesecurity.com/2017/06/06/turlas-watering-hole-campaign-updated-firefox-extension-abusing-instagram/ - webarchive
- https://kindredsec.wordpress.com/2019/08/12/an-overview-of-public-platform-c2s/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Maintools.js
Expects a parameter to run: needs to be started as 'maintools.js EzZETcSXyKAdF_e5I2i1'.
Internal MISP references
UUID 218f8ca8-1124-4e44-8fbd-4b05b46bde4b
which can be used as unique global reference for Maintools.js
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Unidentified JS 001 (APT32 Profiler)
Internal MISP references
UUID f2b0ffdc-7d4e-4786-8935-e7036faa174d
which can be used as unique global reference for Unidentified JS 001 (APT32 Profiler)
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Unidentified JS 003 (Emotet Downloader)
According to Max Kersten, Emotet is dropped by a procedure spanned over multiple stages. The first stage is an office file that contains a macro. This macro then loads the second stage, which is either a PowerShell script or a piece of JavaScript, which is this family entry.
Internal MISP references
UUID 7bf28be0-3153-474d-8df7-e12fec511d7e
which can be used as unique global reference for Unidentified JS 003 (Emotet Downloader)
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Unidentified JS 004
A simple loader written in JavaScript found by Marco Ramilli.
Internal MISP references
UUID a15e7c49-4eb6-46f0-8f79-0b765d7d4e46
which can be used as unique global reference for Unidentified JS 004
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Unidentified JS 005 (Stealer)
Internal MISP references
UUID a797e9b9-cb3f-484a-9273-ac73e9ea1e06
which can be used as unique global reference for Unidentified JS 005 (Stealer)
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Unidentified JS 006 (Winter Wyvern)
A script able to list folders and emails in the current Roundcube account, and to exfiltrate email messages to the C&C server by making HTTP requests.
Internal MISP references
UUID 547fed09-38d0-4813-b9b0-870a1d4136df
which can be used as unique global reference for Unidentified JS 006 (Winter Wyvern)
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Unidentified JS 002
Internal MISP references
UUID 7144063f-966b-4277-b316-00eb970ccd52
which can be used as unique global reference for Unidentified JS 002
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Valak
According to PCrisk, Valak is malicious software that downloads JScript files and executes them. What happens next depends on the actions performed by the executed JScript files. It is very likely that cyber criminals behind Valak attempt to use this malware to cause chain infections (i.e., using Valak to distribute other malware).
Research shows that Valak is distributed through spam campaigns, however, in some cases, it infiltrates systems when they are already infected with malicious program such as Ursnif (also known as Gozi).
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Valak.
Known Synonyms |
---|
Valek |
Internal MISP references
UUID b37b4d91-0ac7-48f5-8fd1-5237b9615cf7
which can be used as unique global reference for Valak
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/js.valak - webarchive
- https://security-soup.net/analysis-of-valak-maldoc/ - webarchive
- https://labs.sentinelone.com/valak-malware-and-the-connection-to-gozi-loader-confcrew/ - webarchive
- https://unit42.paloaltonetworks.com/valak-evolution/ - webarchive
- https://securityintelligence.com/posts/sodinokibi-ransomware-incident-response-intelligence-together/ - webarchive
- https://cocomelonc.github.io/malware/2023/07/26/malware-tricks-35.html - webarchive
- https://threatresearch.ext.hp.com/detecting-ta551-domains/ - webarchive
- https://blog.talosintelligence.com/2020/07/valak-emerges.html - webarchive
- https://unit42.paloaltonetworks.com/atoms/monsterlibra/ - webarchive
- https://medium.com/@prsecurity_/casual-analysis-of-valak-c2-3497fdb79bf7 - webarchive
- https://twitter.com/malware_traffic/status/1207824548021886977 - webarchive
- https://www.cybereason.com/blog/valak-more-than-meets-the-eye - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
witchcoven
Internal MISP references
UUID dcc0fad2-29a9-4b69-9d75-d288ca458bc7
which can be used as unique global reference for witchcoven
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Godzilla Webshell
Internal MISP references
UUID 07e88ccf-6027-412b-99bf-0fa1d3cfb174
which can be used as unique global reference for Godzilla Webshell
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/jsp.godzilla_webshell - webarchive
- https://blog.gigamon.com/2022/09/28/investigating-web-shells/ - webarchive
- https://www.microsoft.com/security/blog/2022/04/12/tarrask-malware-uses-scheduled-tasks-for-defense-evasion/ - webarchive
- https://www.elastic.co/security-labs/ref2924-howto-maintain-persistence-as-an-advanced-threat - webarchive
- https://unit42.paloaltonetworks.com/tiltedtemple-manageengine-servicedesk-plus/ - webarchive
- https://asec.ahnlab.com/en/47455/ - webarchive
- https://unit42.paloaltonetworks.com/manageengine-godzilla-nglite-kdcsponge/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
3CX Backdoor (OS X)
Internal MISP references
UUID d5e10bf9-9de8-46be-96d0-aa502b14ffe8
which can be used as unique global reference for 3CX Backdoor (OS X)
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
AMOS
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular AMOS.
Known Synonyms |
---|
Atomic macOS Stealer |
Internal MISP references
UUID 2fa2be52-e44f-4998-bde7-c66cfb6f4521
which can be used as unique global reference for AMOS
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/osx.amos - webarchive
- https://securelist.com/crimeware-report-fakesg-akira-amos/111483/ - webarchive
- https://www.malwarebytes.com/blog/threat-intelligence/2024/01/atomic-stealer-rings-in-the-new-year-with-updated-version - webarchive
- https://spycloud.com/blog/reverse-engineering-atomic-macos-stealer/ - webarchive
- https://www.malwarebytes.com/blog/threat-intelligence/2023/09/atomic-macos-stealer-delivered-via-malvertising - webarchive
- https://www.bitdefender.com/blog/labs/when-stealers-converge-new-variant-of-atomic-stealer-in-the-wild/ - webarchive
- https://blog.cyble.com/2023/04/26/threat-actor-selling-new-atomic-macos-amos-stealer-on-telegram/ - webarchive
- https://russianpanda.com/2024/01/15/Atomic-Stealer-AMOS/ - webarchive
- https://denshiyurei.medium.com/silent-echoes-the-hidden-dialogue-among-malware-entities-spotlight-on-amos-infostealer-6d7cd70e3219 - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
AppleJeus (OS X)
According to PcRisk AppleJeus is the name of backdoor malware that was distributed by the Lazarus group. They spread this malicious software through a fake app disguised as a cryptocurrency trading application called Celas Trade Pro.
Internal MISP references
UUID ca466f15-8e0a-4030-82cb-5382e3c56ee5
which can be used as unique global reference for AppleJeus (OS X)
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/osx.applejeus - webarchive
- https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/lazarus-north-korea-indictment - webarchive
- https://blog.sekoia.io/the-dprk-delicate-sound-of-cyber/ - webarchive
- https://us-cert.cisa.gov/ncas/analysis-reports/ar21-048b - webarchive
- https://www.blackberry.com/content/dam/blackberry-com/asset/enterprise/pdf/direct/report-bb-2021-threat-report.pdf - webarchive
- https://us-cert.cisa.gov/ncas/alerts/aa21-048a - webarchive
- https://us-cert.cisa.gov/ncas/analysis-reports/ar21-048c - webarchive
- https://www.sentinelone.com/blog/four-distinct-families-of-lazarus-malware-target-apples-macos-platform/ - webarchive
- https://us-cert.cisa.gov/ncas/analysis-reports/ar21-048g - webarchive
- https://objective-see.com/blog/blog_0x5F.html - webarchive
- https://securelist.com/apt-trends-report-q2-2020/97937/ - webarchive
- https://us-cert.cisa.gov/ncas/analysis-reports/ar21-048f - webarchive
- https://www.youtube.com/watch?v=rjA0Vf75cYk - webarchive
- https://posts.specterops.io/introducing-venator-a-macos-tool-for-proactive-detection-34055a017e56 - webarchive
- https://securelist.com/operation-applejeus/87553/ - webarchive
- https://objective-see.com/blog/blog_0x54.html - webarchive
- https://us-cert.cisa.gov/ncas/analysis-reports/ar21-048e - webarchive
- https://www.youtube.com/watch?v=1NkzTKkEM2k - webarchive
- https://blog.lexfo.fr/ressources/Lexfo-WhitePaper-The_Lazarus_Constellation.pdf - webarchive
- https://securelist.com/operation-applejeus-sequel/95596/ - webarchive
- https://us-cert.cisa.gov/ncas/analysis-reports/ar21-048a - webarchive
- https://objective-see.com/blog/blog_0x49.html - webarchive
- https://us-cert.cisa.gov/ncas/analysis-reports/ar21-048d - webarchive
- https://vblocalhost.com/uploads/VB2021-Park.pdf - webarchive
- https://ti.qianxin.com/uploads/2020/02/13/cb78386a082f465f259b37dae5df4884.pdf - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
BANSHEE
Internal MISP references
UUID 5d7b9bcf-a0b6-47eb-8350-a80fac356567
which can be used as unique global reference for BANSHEE
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Bella
Internal MISP references
UUID 3c5036ad-2afc-4bc1-a5a3-b31797f46248
which can be used as unique global reference for Bella
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Bundlore
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Bundlore.
Known Synonyms |
---|
SurfBuyer |
Internal MISP references
UUID 5f5f5496-d9f8-4984-aa66-8702741646fe
which can be used as unique global reference for Bundlore
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/osx.bundlore - webarchive
- https://twitter.com/ConfiantIntel/status/1393215825931288580?s=20 - webarchive
- https://blog.confiant.com/new-macos-bundlore-loader-analysis-ca16d19c058c - webarchive
- https://labs.sentinelone.com/resourceful-macos-malware-hides-in-named-fork/ - webarchive
- https://www.trendmicro.com/en_hk/research/21/f/nukesped-copies-fileless-code-from-bundlore--leaves-it-unused.html - webarchive
- https://www.welivesecurity.com/wp-content/uploads/2020/07/ESET_Threat_Report_Q22020.pdf - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Careto
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Careto.
Known Synonyms |
---|
Appetite |
Mask |
Internal MISP references
UUID dcabea75-a433-4157-bb7a-be76de3026ac
which can be used as unique global reference for Careto
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Casso
Internal MISP references
UUID 387e1a19-458d-4961-a8e4-3f82463085e5
which can be used as unique global reference for Casso
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
CDDS
Google TAG has observed this malware being delivered via watering hole attacks using 0-day exploits, targeting visitors to Hong Kong websites for a media outlet and a prominent pro-democracy labor and political group.
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular CDDS.
Known Synonyms |
---|
Macma |
Internal MISP references
UUID 5e4bdac7-b6c8-4c59-996f-babfc3bb3a3c
which can be used as unique global reference for CDDS
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/osx.cdds - webarchive
- https://www.volexity.com/blog/2024/08/02/stormbamboo-compromises-isp-to-abuse-insecure-software-update-mechanisms/ - webarchive
- https://objective-see.com/blog/blog_0x69.html - webarchive
- https://www.sentinelone.com/labs/infect-if-needed-a-deeper-dive-into-targeted-backdoor-macos-macma/ - webarchive
- https://blog.google/threat-analysis-group/analyzing-watering-hole-campaign-using-macos-exploits/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Choziosi (OS X)
A loader delivering malicious Chrome and Safari extensions.
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Choziosi (OS X).
Known Synonyms |
---|
ChromeLoader |
Chropex |
Internal MISP references
UUID 57f75f24-b77b-46b3-a06a-57d49374fb82
which can be used as unique global reference for Choziosi (OS X)
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/osx.choziosi - webarchive
- https://blogs.blackberry.com/en/2022/11/chromeloader-infects-the-browser-by-loading-malicious-extension - webarchive
- https://www.th3protocol.com/2022/Choziosi-Loader - webarchive
- https://www.crowdstrike.com/blog/how-crowdstrike-uncovered-a-new-macos-browser-hijacking-campaign/ - webarchive
- https://redcanary.com/blog/chromeloader/ - webarchive
- https://github.com/xephora/Threat-Remediation-Scripts/tree/main/Threat-Track/CS_INSTALLER - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
CloudMensis
Internal MISP references
UUID 557fc183-f51a-4740-b2dd-5e81e6f6690a
which can be used as unique global reference for CloudMensis
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
CoinThief
CoinThief was a malware package designed to steal Bitcoins from the victim, consisting of a binary patcher, browser extensions, and a backdoor component.
It was spreading in early 2014 from several different sources: - on Github (where the trojanized compiled binary didn’t match the displayed source code), o - on popular and trusted download sites line CNET's Download.com or MacUpdate.com, and - as cracked applications via torrents camouflaged as Bitcoin Ticker TTM, BitVanity, StealthBit, Litecoin Ticker, BBEdit, Pixelmator, Angry Birds and Delicious Library.
The patcher‘s role was to locate and modify legitimate versions of the Bitcoin-Qt wallet application. The analyzed malware samples targeted versions of Bitcoin-Qt 0.8.1, 0.8.0 and 0.8.5. The earlier patch modified Bitcoin-Qt adding malicious code that would send nearly all the victim’s Bitcoins to one of the hard-coded addresses belonging to the attacker.
The browser extensions targeted Chrome and Firefox and are disguised as a “Pop-up blocker”. The extensions monitored visited websites, download malicious JavaScripts and injected them into various Bitcoin-related websites (mostly Bitcoin exchanges and online wallet sites). The injected JS scripts were able to modify transactions to redirect Bitcoin transfers to an attacker’s address or simply harvest login credentials to the targeted online service.
The backdoor enabled the attacker to take full control over the victim’s computer: - collect information about the infected computer - execute arbitrary shell scripts on the target computer - upload an arbitrary file from the victim’s hard drive to a remote server - update itself to a newer version
Internal MISP references
UUID 70e73da7-21d3-4bd6-9a0e-0c904e6457e8
which can be used as unique global reference for CoinThief
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Coldroot RAT
Internal MISP references
UUID 076a7ae0-f4b8-45c7-9de4-dc9cc7e54bcf
which can be used as unique global reference for Coldroot RAT
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Convuster
Internal MISP references
UUID 3819ded3-27ac-4e2f-9cd6-c6ef1642599b
which can be used as unique global reference for Convuster
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
CpuMeaner
Internal MISP references
UUID 74360d1e-8f85-44d1-8ce7-e76afb652142
which can be used as unique global reference for CpuMeaner
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
CreativeUpdater
Internal MISP references
UUID 40fc6f71-75ac-43ac-abd9-c90b0e847999
which can be used as unique global reference for CreativeUpdater
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/osx.creative_updater - webarchive
- https://blog.malwarebytes.com/threat-analysis/2018/02/new-mac-cryptominer-distributed-via-a-macupdate-hack/ - webarchive
- https://digitasecurity.com/blog/2018/02/05/creativeupdater/ - webarchive
- https://objective-see.com/blog/blog_0x29.html - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Crisis
Internal MISP references
UUID 2bb6c494-8057-4d83-9202-fda3284deee4
which can be used as unique global reference for Crisis
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/osx.crisis - webarchive
- https://www.intego.com/mac-security-blog/new-apple-mac-trojan-called-osxcrisis-discovered-by-intego-virus-team/? - webarchive
- https://www.symantec.com/connect/blogs/crisis-windows-sneaks-virtual-machines - webarchive
- http://contagiodump.blogspot.com/2012/12/aug-2012-w32crisis-and-osxcrisis-jar.html - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Crossrider
Internal MISP references
UUID 05ddb459-5a2f-44d5-a135-ed3f1e772302
which can be used as unique global reference for Crossrider
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Cthulhu Stealer
Internal MISP references
UUID 549f4c7c-55e3-478e-a84e-e27c5e195c97
which can be used as unique global reference for Cthulhu Stealer
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Dacls (OS X)
According to PCrisk, Dacls is the name of a remote access Trojan (RAT), a malicious program that allows cyber criminals to control infected computers remotely.
Research shows that this malware is tied to Lazarus Group (a group of cyber criminals) and targets Linux and the Windows Operating System. Typically, cyber criminals use RATs to steal sensitive, confidential information, infect systems with other malware, and so on. In any case, no RAT is harmless and should be uninstalled immediately.
Internal MISP references
UUID 81def650-f52e-49a3-a3fe-cb53ffa75d67
which can be used as unique global reference for Dacls (OS X)
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/osx.dacls - webarchive
- https://blog.trendmicro.com/trendlabs-security-intelligence/new-macos-dacls-rat-backdoor-show-lazarus-multi-platform-attack-capability - webarchive
- https://blog.trendmicro.com/trendlabs-security-intelligence/new-macos-dacls-rat-backdoor-show-lazarus-multi-platform-attack-capability/ - webarchive
- https://objective-see.com/blog/blog_0x57.html - webarchive
- https://www.blackberry.com/content/dam/blackberry-com/asset/enterprise/pdf/direct/report-bb-2021-threat-report.pdf - webarchive
- https://objective-see.com/blog/blog_0x5F.html - webarchive
- https://securelist.com/apt-trends-report-q2-2020/97937/ - webarchive
- https://www.sygnia.co/mata-framework - webarchive
- https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/ - webarchive
- https://blog.malwarebytes.com/threat-analysis/2020/05/new-mac-variant-of-lazarus-dacls-rat-distributed-via-trojanized-2fa-app/ - webarchive
- https://www.sentinelone.com/blog/four-distinct-families-of-lazarus-malware-target-apples-macos-platform/ - webarchive
- https://securelist.com/mata-multi-platform-targeted-malware-framework/97746/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
DarthMiner
Internal MISP references
UUID a8e71805-014d-4998-b21e-3125da800124
which can be used as unique global reference for DarthMiner
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
DazzleSpy
Internal MISP references
UUID ba2c7d3c-7f7a-42f7-854c-a6cc0b5eb850
which can be used as unique global reference for DazzleSpy
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Dockster
Internal MISP references
UUID 713d8ec4-4983-4fbb-827c-2ef5bc0e6930
which can be used as unique global reference for Dockster
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Dummy
Internal MISP references
UUID cbf9ff89-d35b-4954-8873-32f59f5e4d7d
which can be used as unique global reference for Dummy
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Eleanor
Eleanor comes as a drag-and-drop file utility called EasyDoc Converter. This application bundle wraps a shell script that uses Dropbox name as a disguise and installs three components: a hidden Tor service, a Pastebin agent and a web service with a PHP-based graphical interface.
The Tor service transforms the victim’s computer into a server that provides attackers with full anonymous access to the infected machine via Tor-generated address.
The Pastebin agent uploads the address in encrypted form to the Pastebin website where the attackers can obtain it.
The web service is the main malicious component that provides the attackers with the control over the infected machine. After successful authentication, the interface offers several control panels to the attackers, allowing them to do the following actions:
- Managing files
- Listing processes
- Connecting to various database management systems such as MySQL or SQLite
- Connecting via bind/reverse shell
- Executing shell command
- Capturing and browsing images and videos from the victim’s webcam
- Sending emails with an attachment
Internal MISP references
UUID c221e519-fe3e-416e-bc63-a2246b860958
which can be used as unique global reference for Eleanor
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
ElectroRAT
According to PCrisk, ElectroRAT is a Remote Access Trojan (RAT) written in the Go programming language and designed to target Windows, MacOS, and Linux users. Cyber criminals behind ElectroRAT target mainly cryptocurrency users. This RAT is distributed via the trojanized Jamm, eTrader, and DaoPoker applications.
Internal MISP references
UUID f8ccf928-7d4f-4999-91a5-9222f148152d
which can be used as unique global reference for ElectroRAT
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/osx.electro_rat - webarchive
- https://www.blackberry.com/content/dam/blackberry-com/asset/enterprise/pdf/direct/report-old-dogs-new-tricks.pdf - webarchive
- https://www.intezer.com/blog/research/operation-electrorat-attacker-creates-fake-companies-to-drain-your-crypto-wallets/ - webarchive
- https://objective-see.com/blog/blog_0x61.html - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
EvilOSX
Internal MISP references
UUID 24f3d8e1-3936-4664-b813-74c797b87d9d
which can be used as unique global reference for EvilOSX
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
EvilQuest
According to PcRisk, EvilQuest (also known as ThiefQuest) is like many other malicious programs of this type - it encrypts files and creates a ransom message. In most cases, this type of malware modifies the names of encrypted files by appending certain extensions, however, this ransomware leaves them unchanged.
It drops the "READ_ME_NOW.txt" in each folder that contains encrypted data and displays another ransom message in a pop-up window. Additionally, this malware is capable of detecting if certain files are stored on the computer, operates as a keylogger, and receives commands from a Command & Control server.
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular EvilQuest.
Known Synonyms |
---|
ThiefQuest |
Internal MISP references
UUID d5b39223-a8cc-4d47-8030-1d7d6312d351
which can be used as unique global reference for EvilQuest
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/osx.evilquest - webarchive
- https://www.bleepingcomputer.com/news/security/evilquest-wiper-uses-ransomware-cover-to-steal-files-from-macs/ - webarchive
- https://www.sentinelone.com/labs/defeating-macos-malware-anti-analysis-tricks-with-radare2/ - webarchive
- https://labs.sentinelone.com/breaking-evilquest-reversing-a-custom-macos-ransomware-file-encryption-routine/ - webarchive
- https://www.blackberry.com/content/dam/blackberry-com/asset/enterprise/pdf/direct/report-bb-2021-threat-report.pdf - webarchive
- https://objective-see.com/blog/blog_0x5F.html - webarchive
- https://www.crowdstrike.com/blog/how-crowdstrike-analyzes-macos-malware-to-optimize-automated-detection-capabilities - webarchive
- https://twitter.com/dineshdina04/status/1277668001538433025 - webarchive
- https://objective-see.com/blog/blog_0x59.html - webarchive
- https://github.com/gdbinit/evilquest_deobfuscator - webarchive
- https://www.sentinelone.com/blog/evilquest-a-new-macos-malware-rolls-ransomware-spyware-and-data-theft-into-one/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
FailyTale
Internal MISP references
UUID 5dfd704c-a69d-4e93-bd70-68f89fbbb32c
which can be used as unique global reference for FailyTale
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
FinFisher (OS X)
Internal MISP references
UUID 89ce536c-03b9-4f69-83ce-723f26b36494
which can be used as unique global reference for FinFisher (OS X)
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/osx.finfisher - webarchive
- https://reverse.put.as/2020/09/26/the-finfisher-tales-chapter-1/ - webarchive
- https://objective-see.com/blog/blog_0x4F.html - webarchive
- https://objective-see.com/blog/blog_0x5F.html - webarchive
- https://securelist.com/finspy-unseen-findings/104322/ - webarchive
- https://www.amnesty.org/en/latest/research/2020/09/german-made-finspy-spyware-found-in-egypt-and-mac-and-linux-versions-revealed/ - webarchive
- https://netzpolitik.org/2020/our-criminal-complaint-german-state-malware-company-finfisher-raided/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
FlashBack
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular FlashBack.
Known Synonyms |
---|
FakeFlash |
Internal MISP references
UUID f92b5355-f398-4f09-8bcc-e06df6fe51a0
which can be used as unique global reference for FlashBack
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/osx.flashback - webarchive
- https://news.drweb.com/show/?c=5&i=2386&lng=en - webarchive
- http://contagiodump.blogspot.com/2012/04/osxflashbacko-sample-some-domains.html - webarchive
- https://en.wikipedia.org/wiki/Flashback_(Trojan) - webarchive
- http://contagiodump.blogspot.com/2012/04/osxflashbackk-sample-mac-os-malware.html - webarchive
- https://web-assets.esetstatic.com/wls/200x/white-papers/osx_flashback.pdf - webarchive
- https://www.crowdstrike.com/blog/how-crowdstrike-analyzes-macos-malware-to-optimize-automated-detection-capabilities - webarchive
- https://www.alienvault.com/blogs/labs-research/os-x-malware-samples-analyzed - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
FruitFly
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular FruitFly.
Known Synonyms |
---|
Quimitchin |
Internal MISP references
UUID a517cdd1-6c82-4b29-bdd2-87e281227597
which can be used as unique global reference for FruitFly
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/osx.fruitfly - webarchive
- https://objectivebythesea.com/v3/talks/OBTS_v3_tReed.pdf - webarchive
- https://arstechnica.com/security/2017/07/perverse-malware-infecting-hundreds-of-macs-remained-undetected-for-years/ - webarchive
- https://arstechnica.com/security/2017/01/newly-discovered-mac-malware-may-have-circulated-in-the-wild-for-2-years/ - webarchive
- https://blog.malwarebytes.com/threat-analysis/2017/01/new-mac-backdoor-using-antiquated-code/ - webarchive
- https://www.documentcloud.org/documents/4346338-Phillip-Durachinsky-Indictment.html - webarchive
- https://www.virusbulletin.com/virusbulletin/2017/11/vb2017-paper-offensive-malware-analysis-dissecting-osxfruitflyb-custom-cc-server/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
FULLHOUSE
Fullhouse (AKA FULLHOUSE.DOORED) is a custom backdoor used by subsets of the North Korean Lazarus Group. Fullhouse is written in C/C++ and includes the capabilities of a tunneler and backdoor commands support such as shell command execution, file transfer, file managment, and process injection. C2 communications occur via HTTP and require configuration through the command line or a configuration file.
Internal MISP references
UUID 2ab781d8-214d-41e2-acc9-23ded4f77663
which can be used as unique global reference for FULLHOUSE
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
GIMMICK (OS X)
This multi-platform malware is a ObjectiveC written macOS variant dubbed GIMMICK by Volexity. This malware is a file-based C2 implant used by Storm Cloud.
Internal MISP references
UUID 0e259d0f-717a-4ced-ac58-6fe9d72e2c96
which can be used as unique global reference for GIMMICK (OS X)
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Gmera
According to PCrisk, GMERA (also known as Kassi trojan) is malicious software that disguises itself as Stockfolio, a legitimate trading app created for Mac users.
Research shows that there are two variants of this malware, one detected as Trojan.MacOS.GMERA.A and the other as Trojan.MacOS.GMERA.B. Cyber criminals proliferate GMERA to steal various information and upload it to a website under their control. To avoid damage caused by this malware, remove GMERA immediately.
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Gmera.
Known Synonyms |
---|
Kassi |
StockSteal |
Internal MISP references
UUID 1c65cf4e-5df4-4d56-a414-7b05f00814ba
which can be used as unique global reference for Gmera
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/osx.gmera - webarchive
- https://www.welivesecurity.com/2020/07/16/mac-cryptocurrency-trading-application-rebranded-bundled-malware/ - webarchive
- https://blog.trendmicro.com/trendlabs-security-intelligence/mac-malware-that-spoofs-trading-app-steals-user-information-uploads-it-to-website/ - webarchive
- https://objective-see.com/blog/blog_0x53.html - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
HiddenLotus
According to Malwarebytes, The HiddenLotus "dropper" is an application named Lê Thu Hà (HAEDC).pdf, using an old trick of disguising itself as a document - in this case, an Adobe Acrobat file.
Internal MISP references
UUID fc17e41f-e9f7-4442-a05c-7a19b9174c39
which can be used as unique global reference for HiddenLotus
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
HLOADER
Internal MISP references
UUID 28304d68-689e-4488-80cb-d5b7b50a8d57
which can be used as unique global reference for HLOADER
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
HZ RAT (OS X)
Internal MISP references
UUID 37f37678-c8c3-44d7-82bd-ecb452fba012
which can be used as unique global reference for HZ RAT (OS X)
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
iMuler
The threat was a multi-stage malware displaying a decoy that appeared to the victim as a Chinese language article on the long-running dispute over the Diaoyu Islands; an array of erotic pictures; or images of Tibetan organisations. It consisted of two stages: Revir was the dropper/downloader and Imuler was the backdoor capable of the following operations:
- capture screenshots
- exfiltrate files to a remote computer
- send various information about the infected computer
- extract ZIP archive
- download files from a remote computer and/or the Internet
- run executable files
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular iMuler.
Known Synonyms |
---|
Revir |
Internal MISP references
UUID 261fd543-60e4-470f-af28-7a9b17ba4759
which can be used as unique global reference for iMuler
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/osx.imuler - webarchive
- https://nakedsecurity.sophos.com/2012/11/13/new-mac-trojan/ - webarchive
- http://contagiodump.blogspot.com/2012/11/group-photoszip-osxrevir-osximuler.html - webarchive
- https://www.welivesecurity.com/2012/03/16/osximuler-updated-still-a-threat-on-mac-os-x/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Interception (OS X)
Internal MISP references
UUID d4f7ea92-04e7-405c-9faf-7993ffd5c473
which can be used as unique global reference for Interception (OS X)
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/osx.interception - webarchive
- https://twitter.com/ESETresearch/status/1559553324998955010 - webarchive
- https://labs.k7computing.com/index.php/lazarus-apts-operation-interception-uses-signed-binary/ - webarchive
- https://www.sentinelone.com/blog/lazarus-operation-interception-targets-macos-users-dreaming-of-jobs-in-crypto - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Janicab (OS X)
According to Patrick Wardle, this malware persists a python script as a cron job. Steps: 1. Python installer first saves any existing cron jobs into a temporary file named '/tmp/dump'. 2. Appends its new job to this file. 3. Once the new cron job has been added 'python (~/.t/runner.pyc)' runs every minute.
Internal MISP references
UUID 01325d85-297f-40d5-b829-df9bd996af5a
which can be used as unique global reference for Janicab (OS X)
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/osx.janicab - webarchive
- https://www.malwarology.com/2022/05/janicab-series-further-steps-in-the-infection-chain/ - webarchive
- https://www.malwarology.com/2022/05/janicab-series-first-steps-in-the-infection-chain/ - webarchive
- https://www.macmark.de/blog/osx_blog_2013-08-a.php - webarchive
- https://www.malwarology.com/2022/05/janicab-series-attibution-and-iocs/ - webarchive
- https://www.malwarology.com/2022/05/janicab-series-the-core-artifact/ - webarchive
- https://www.malwarology.com/posts/5-janicab-part_1/ - webarchive
- https://securelist.com/deathstalker-mercenary-triumvirate/98177/ - webarchive
- https://sec0wn.blogspot.com/2018/12/powersing-from-lnk-files-to-janicab.html - webarchive
- https://archive.f-secure.com/weblog/archives/00002576.html - webarchive
- https://blog.avast.com/2013/07/22/multisystem-trojan-janicab-attacks-windows-and-macosx-via-scripts/ - webarchive
- https://securelist.com/deathstalker-targets-legal-entities-with-new-janicab-variant/108131/ - webarchive
- https://securelist.com/apt-trends-report-q3-2020/99204/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
JokerSpy
Internal MISP references
UUID 171b0695-8cea-4ca6-a3f0-c9a8455ef9de
which can be used as unique global reference for JokerSpy
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
KANDYKORN
Internal MISP references
UUID d314856b-1c07-4f4a-ab3e-eeae38536857
which can be used as unique global reference for KANDYKORN
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
KeRanger
Internal MISP references
UUID 01643bc9-bd61-42e8-b9f1-5fbf83dcd786
which can be used as unique global reference for KeRanger
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/osx.keranger - webarchive
- http://researchcenter.paloaltonetworks.com/2016/03/new-os-x-ransomware-keranger-infected-transmission-bittorrent-client-installer/ - webarchive
- https://objective-see.com/blog/blog_0x16.html - webarchive
- https://www.macworld.com/article/3234650/macs/keranger-the-first-in-the-wild-ransomware-for-macs-but-certainly-not-the-last.html - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Keydnap
Internal MISP references
UUID 2173605b-bf44-4c76-b75a-09c53bb322d6
which can be used as unique global reference for Keydnap
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/osx.keydnap - webarchive
- https://github.com/eset/malware-ioc/tree/master/keydnap - webarchive
- https://objective-see.com/blog/blog_0x16.html - webarchive
- https://www.welivesecurity.com/2016/08/30/osxkeydnap-spreads-via-signed-transmission-application/ - webarchive
- http://www.welivesecurity.com/2016/07/06/new-osxkeydnap-malware-hungry-credentials/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Kitmos
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Kitmos.
Known Synonyms |
---|
KitM |
Internal MISP references
UUID 8a1b1c99-c149-4339-9058-db3b4084cdcd
which can be used as unique global reference for Kitmos
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Komplex
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Komplex.
Known Synonyms |
---|
JHUHUGIT |
JKEYSKW |
SedUploader |
Internal MISP references
UUID d26b5518-8d7f-41a6-b539-231e4962853e
which can be used as unique global reference for Komplex
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/osx.komplex - webarchive
- https://objective-see.com/blog/blog_0x16.html - webarchive
- http://www.welivesecurity.com/wp-content/uploads/2016/10/eset-sednit-part1.pdf - webarchive
- https://contagiodump.blogspot.de/2017/02/russian-apt-apt28-collection-of-samples.html - webarchive
- http://researchcenter.paloaltonetworks.com/2016/09/unit42-sofacys-komplex-os-x-trojan/ - webarchive
- https://blog.malwarebytes.com/threat-analysis/2016/09/komplex-mac-backdoor-answers-old-questions/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Kuiper (OS X)
Internal MISP references
UUID c39087ca-05b7-4374-aff1-116a73f2ba74
which can be used as unique global reference for Kuiper (OS X)
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Lador
Internal MISP references
UUID 9c6b54ce-44a0-4d0c-89cb-6532c8f89d8d
which can be used as unique global reference for Lador
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Lambert (OS X)
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Lambert (OS X).
Known Synonyms |
---|
GreenLambert |
Internal MISP references
UUID 7433f3a8-f53c-4ba0-beff-e312fae9ad39
which can be used as unique global reference for Lambert (OS X)
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Laoshu
Internal MISP references
UUID a13a2cb8-b0e6-483a-9916-f44969a2c42b
which can be used as unique global reference for Laoshu
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Leverage
Internal MISP references
UUID 15daa766-f721-4fd5-95fb-153f5361fb87
which can be used as unique global reference for Leverage
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
LockBit (OS X)
Internal MISP references
UUID 0821b5c8-db48-4d0e-a969-384dbd74a6c9
which can be used as unique global reference for LockBit (OS X)
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/osx.lockbit - webarchive
- https://www.washingtonpost.com/business/2024/02/20/lockbit-ransomware-cronos-nca-fbi/ - webarchive
- https://nationalcrimeagency.gov.uk/news/nca-leads-international-investigation-targeting-worlds-most-harmful-ransomware-group - webarchive
- https://medium.com/@lcam/lighting-the-exfiltration-infrastructure-of-a-lockbit-affiliate-and-more-f57fbb7a4e79 - webarchive
- https://www.europol.europa.eu/media-press/newsroom/news/law-enforcement-disrupt-worlds-biggest-ransomware-operation - webarchive
- https://krebsonsecurity.com/2023/05/russian-hacker-wazawaka-indicted-for-ransomware/ - webarchive
- https://noticeofpleadings.com/crackedcobaltstrike/files/ComplaintAndSummons/1%20-Microsoft%20Cobalt%20Strike%20-%20Complaint(907040021.9).pdf - webarchive
- https://twitter.com/malwrhunterteam/status/1647384505550876675 - webarchive
- https://blog.talosintelligence.com/talos-ir-q2-2023-quarterly-recap/ - webarchive
- https://analyst1.com/lockbit-takedown-operation-cronos-a-long-awaited-psyops-against-ransomware/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
MacDownloader
Internal MISP references
UUID 910d3c78-1a9e-4600-a3ea-4aa5563f0f13
which can be used as unique global reference for MacDownloader
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
MacInstaller
Internal MISP references
UUID d1f8af3c-719b-4f64-961b-8d89a2defa02
which can be used as unique global reference for MacInstaller
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
MacRansom
Internal MISP references
UUID 66862f1a-5823-4a9a-bd80-439aaafc1d8b
which can be used as unique global reference for MacRansom
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
MacSpy
Internal MISP references
UUID c9915d41-d1fb-45bc-997e-5cd9c573d8e7
which can be used as unique global reference for MacSpy
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
MacVX
Internal MISP references
UUID 4db9012b-d3a1-4f19-935c-4dbc7fdd93fe
which can be used as unique global reference for MacVX
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
MaMi
Internal MISP references
UUID 7759534c-3298-42e9-adab-896d7e507f4f
which can be used as unique global reference for MaMi
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Manuscrypt
Internal MISP references
UUID f85c3ec9-81f0-4dee-87e6-b3f6b235bfe7
which can be used as unique global reference for Manuscrypt
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/osx.manuscrypt - webarchive
- https://twitter.com/BitsOfBinary/status/1337330286787518464 - webarchive
- https://www.anquanke.com/post/id/223817 - webarchive
- https://www.blackberry.com/content/dam/blackberry-com/asset/enterprise/pdf/direct/report-bb-2021-threat-report.pdf - webarchive
- https://twitter.com/BitsOfBinary/status/1321488299932983296 - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Mokes (OS X)
Internal MISP references
UUID bfbb6e5a-32dc-4842-936c-5d8497570c74
which can be used as unique global reference for Mokes (OS X)
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/osx.mokes - webarchive
- https://objective-see.com/blog/blog_0x16.html - webarchive
- https://objective-see.com/blog/blog_0x53.html - webarchive
- https://securelist.com/blog/research/75990/the-missing-piece-sophisticated-os-x-backdoor-discovered/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Mughthesec
Internal MISP references
UUID aa1bf4e5-9c44-42a2-84e5-7526e4349405
which can be used as unique global reference for Mughthesec
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
NetWire
Internal MISP references
UUID f0d52afd-e7c9-4bd1-be8a-9ab09b14ea24
which can be used as unique global reference for NetWire
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
OceanLotus
According to PcRisk, Research shows that the OceanLotus 'backdoor' targets MacOS computers. Cyber criminals behind this backdoor have already used this malware to attack human rights and media organizations, some research institutes, and maritime construction companies.
The OceanLotus backdoor is distributed via a fake Adobe Flash Player installer and a malicious Word document (it is likely that threat authors distribute the document via malspam emails).
Internal MISP references
UUID 65b7eff4-741c-445e-b4e0-8a4e4f673a65
which can be used as unique global reference for OceanLotus
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/osx.oceanlotus - webarchive
- https://blog.trendmicro.com/trendlabs-security-intelligence/new-macos-backdoor-linked-to-oceanlotus-found/ - webarchive
- https://researchcenter.paloaltonetworks.com/2017/06/unit42-new-improved-macos-backdoor-oceanlotus/ - webarchive
- https://github.com/AmnestyTech/investigations/tree/master/2021-02-24_vietnam - webarchive
- https://www.trendmicro.com/en_us/research/20/k/new-macos-backdoor-connected-to-oceanlotus-surfaces.html - webarchive
- https://about.fb.com/news/2020/12/taking-action-against-hackers-in-bangladesh-and-vietnam/ - webarchive
- https://www.fireeye.com/blog/threat-research/2017/05/cyber-espionage-apt32.html - webarchive
- https://www.welivesecurity.com/2019/04/09/oceanlotus-macos-malware-update/ - webarchive
- https://labs.sentinelone.com/apt32-multi-stage-macos-trojan-innovates-on-crimeware-scripting-technique/ - webarchive
- https://github.com/microsoft/Microsoft-365-Defender-Hunting-Queries - webarchive
- https://www.alienvault.com/blogs/labs-research/oceanlotus-for-os-x-an-application-bundle-pretending-to-be-an-adobe-flash-update - webarchive
- https://tradahacking.vn/%C4%91%E1%BB%A3t-r%E1%BB%93i-t%C3%B4i-c%C3%B3-%C4%91%C4%83ng-m%E1%BB%99t-status-xin-d%E1%BA%A1o-tr%C3%AAn-fb-may-qu%C3%A1-c%C5%A9ng-c%C3%B3-v%C3%A0i-b%E1%BA%A1n-nhi%E1%BB%87t-t%C3%ACnh-g%E1%BB%ADi-cho-537b19ee3468 - webarchive
- https://brandefense.io/blog/apt-groups/ocean-lotus-apt-group/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Olyx
Internal MISP references
UUID cd397973-8f42-4c49-8322-414ea77ec773
which can be used as unique global reference for Olyx
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
oRAT
SentinelOne describes this as a malware written in Go, mixing own custom code with code from public repositories.
Internal MISP references
UUID 699dac0f-092c-4c8e-85e9-6e3c86129190
which can be used as unique global reference for oRAT
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/osx.orat - webarchive
- https://documents.trendmicro.com/assets/txt/earth-berberoka-macos-iocs-2.txt - webarchive
- https://documents.trendmicro.com/assets/white_papers/wp-operation-earth-berberoka.pdf - webarchive
- https://www.botconf.eu/wp-content/uploads/2022/05/Botconf2022-40-LunghiHorejsi.pdf - webarchive
- https://www.sentinelone.com/blog/from-the-front-lines-unsigned-macos-orat-malware-gambles-for-the-win/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
OSAMiner
Internal MISP references
UUID 89d0c423-c4ff-46e8-8c79-ea5e974e53e7
which can be used as unique global reference for OSAMiner
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Patcher
This crypto-ransomware for macOS was caught spreading via BitTorrent distribution sites in February 2017, masquerading as 'Patcher', an application used for pirating popular software like Adobe Premiere Pro or Microsoft Office for Mac.
The downloaded torrent contained an application bundle in the form of a single zip file. After launching the fake application, the main window of the fake cracking tool was displayed.
The file encryption process was launched after the misguided victim clicked 'Start'. Once executed, the ransomware generated a random 25-character string and set it as the key for RC4 encryption of all of the user's files. It then demanded ransom in Bitcoin, as instructed in the 'README!' .txt file copied all over the user's directories.
Despite the instructions being quite thorough, Patcher lacked the functionality to communicate with any C&C server, and therefore made it impossible for its operators to decrypt affected files. The randomly generated encryption key was also too long to be guessed via a brute-force attack, leaving the encrypted data unrecoverable in a reasonable amount of time.
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Patcher.
Known Synonyms |
---|
FileCoder |
Findzip |
Internal MISP references
UUID bad1057c-4f92-4747-a0ec-31bcc062dab8
which can be used as unique global reference for Patcher
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
PintSized
Backdoor as a fork of OpenSSH_6.0 with no logging, and “-P” and “-z” hidden command arguments. “PuffySSH_5.8p1” string.
Internal MISP references
UUID de13bec0-f443-4c5a-91fe-2223dad43be5
which can be used as unique global reference for PintSized
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Pirrit
Internal MISP references
UUID b749ff3a-df68-4b38-91f1-649864eae52c
which can be used as unique global reference for Pirrit
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/osx.pirrit - webarchive
- http://go.cybereason.com/rs/996-YZT-709/images/Cybereason-Lab-Analysis-OSX-Pirrit-4-6-16.pdf - webarchive
- https://forensicitguy.github.io/analyzing-pirrit-adware-installer/ - webarchive
- http://www.zdnet.com/article/maker-of-sneaky-mac-adware-sends-security-researcher-cease-and-desist-letter/ - webarchive
- https://www.cybereason.com/hubfs/Content%20PDFs/OSX.Pirrit%20Part%20III%20The%20DaVinci%20Code.pdf - webarchive
- https://www.welivesecurity.com/wp-content/uploads/2020/07/ESET_Threat_Report_Q22020.pdf - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
POOLRAT
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular POOLRAT.
Known Synonyms |
---|
SIMPLESEA |
SIMPLETEA |
Internal MISP references
UUID bfd9e30e-ddc7-426f-8f77-4d2e1a846541
which can be used as unique global reference for POOLRAT
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/osx.poolrat - webarchive
- https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/lazarus-north-korea-indictment - webarchive
- https://www.welivesecurity.com/2023/04/20/linux-malware-strengthens-links-lazarus-3cx-supply-chain-attack - webarchive
- https://us-cert.cisa.gov/ncas/analysis-reports/ar21-048e - webarchive
- https://www.mandiant.com/resources/blog/3cx-software-supply-chain-compromise - webarchive
- https://www.virusbulletin.com/uploads/pdf/conference/vb2023/papers/Lazarus-campaigns-and-backdoors-in-2022-2023.pdf - webarchive
- https://www.3cx.com/blog/news/mandiant-security-update2/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Poseidon (OS X)
Part of Mythic C2, written in Golang.
Internal MISP references
UUID e4ac9105-c3ad-41e2-846b-048e2bbedc6a
which can be used as unique global reference for Poseidon (OS X)
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Poseidon Stealer
macOS infostealer sold by an individual named Rodrigo4, currently consisting of a disk image containing a Mach-O without app bundle, which when executed spawns osascript executing an AppleScript with the actual infostealer payload. The AppleScript payload will steal files by packing them in a ZIP archive and uploading them to a hardcoded C2 via HTTP.
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Poseidon Stealer.
Known Synonyms |
---|
Rodrigo Stealer |
Internal MISP references
UUID 9eb9f899-acfb-4452-981f-5937aa1f47cc
which can be used as unique global reference for Poseidon Stealer
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/osx.poseidonstealer - webarchive
- https://www.malwarebytes.com/blog/news/2024/06/poseidon-mac-stealer-distributed-via-google-ads - webarchive
- https://github.com/govcert-ch/CTI/tree/main/20240627_macOS_PoseidonStealer - webarchive
- https://www.ncsc.admin.ch/ncsc/en/home/aktuell/im-fokus/2024/poseidon_bericht.html - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Proton RAT
Proton RAT is a Remote Access Trojan (RAT) specifically designed for macOS systems. It is known for providing attackers with complete remote control over the infected system, allowing the execution of commands, keystroke capturing, access to the camera and microphone, and the ability to steal credentials stored in browsers and other password managers. This malware typically spreads through malicious or modified applications, which, when downloaded and installed by unsuspecting users, trigger its payload. Proton RAT is notorious for its sophistication and evasion capabilities, including techniques to bypass detection by installed security solutions.
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Proton RAT.
Known Synonyms |
---|
Calisto |
Internal MISP references
UUID d7e31f19-8bf2-4def-8761-6c5bf7feaa44
which can be used as unique global reference for Proton RAT
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/osx.proton_rat - webarchive
- https://www.welivesecurity.com/2017/10/20/osx-proton-supply-chain-attack-elmedia/ - webarchive
- https://objective-see.com/blog/blog_0x1D.html - webarchive
- https://www.cybereason.com/labs-blog/labs-proton-b-what-this-mac-malware-actually-does - webarchive
- https://threatpost.com/handbrake-for-mac-compromised-with-proton-spyware/125518/ - webarchive
- https://www.hackread.com/hackers-selling-undetectable-proton-mac-malware/ - webarchive
- https://www.cybersixgill.com/wp-content/uploads/2017/02/02072017%20-%20Proton%20-%20A%20New%20MAC%20OS%20RAT%20-%20Sixgill%20Threat%20Report.pdf - webarchive
- https://securelist.com/calisto-trojan-for-macos/86543/ - webarchive
- https://blog.malwarebytes.com/threat-analysis/mac-threat-analysis/2017/11/osx-proton-spreading-through-fake-symantec-blog/ - webarchive
- https://objective-see.com/blog/blog_0x1F.html - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Pwnet
Cryptocurrency miner that was distributed masquerading as a Counter-Strike: Global Offensive hack.
Internal MISP references
UUID 70059ec2-9315-4af7-b65b-2ec35676a7bb
which can be used as unique global reference for Pwnet
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Dok
Dok a.k.a. Retefe is the macOS version of the banking trojan Retefe. It consists of a codesigned Mach-O dropper usually malspammed in an app bundle within a DMG disk image, posing as a document. The primary purpose of the dropper is to install a Tor client as well as a malicious CA certificate and proxy pac URL, in order to redirect traffic to targeted sites through their Tor node, effectively carrying out a MITM attack against selected web traffic. It also installs a custom hosts file to prevent access to Apple and VirusTotal. The macOS version shares its MO, many TTPs and infrastructure with the Windows counterpart.
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Dok.
Known Synonyms |
---|
Retefe |
Internal MISP references
UUID 80acc956-d418-42e3-bddf-078695a01289
which can be used as unique global reference for Dok
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/osx.retefe - webarchive
- https://www.proofpoint.com/us/threat-insight/post/2019-return-retefe - webarchive
- https://www.govcert.admin.ch/blog/33/the-retefe-saga - webarchive
- https://blog.checkpoint.com/2017/07/13/osxdok-refuses-go-away-money/ - webarchive
- http://blog.checkpoint.com/2017/04/27/osx-malware-catching-wants-read-https-traffic/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
RustBucket (OS X)
Internal MISP references
UUID 03f356e6-296f-4195-bed0-9719a84887db
which can be used as unique global reference for RustBucket (OS X)
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/osx.rustbucket - webarchive
- https://sansorg.egnyte.com/dl/3P3HxFiNgL - webarchive
- https://securelist.com/bluenoroff-new-macos-malware/111290/ - webarchive
- https://www.sentinelone.com/blog/bluenoroff-how-dprks-macos-rustbucket-seeks-to-evade-analysis-and-detection/ - webarchive
- https://blogs.jpcert.or.jp/ja/2023/05/dangerouspassword.html - webarchive
- https://www.elastic.co/security-labs/DPRK-strikes-using-a-new-variant-of-rustbucket - webarchive
- https://www.jamf.com/blog/bluenoroff-apt-targets-macos-rustbucket-malware/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Shlayer
According to PCrisk, Shlayer is a trojan-type virus designed to proliferate various adware and other unwanted applications, and promote fake search engines. It is typically disguised as a Adobe Flash Player installer and various software cracking tools.
In most cases, users encounter this virus when visiting dubious Torrent websites that are full of intrusive advertisements and deceptive downloads.
Internal MISP references
UUID c3ee82df-a004-4c68-89bd-eb4bb2dfc803
which can be used as unique global reference for Shlayer
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/osx.shlayer - webarchive
- https://www.cisecurity.org/insights/blog/top-10-malware-march-2022 - webarchive
- https://securelist.com/shlayer-for-macos/95724/ - webarchive
- https://us-cert.cisa.gov/ncas/alerts/aa20-345a - webarchive
- https://objective-see.com/blog/blog_0x64.html - webarchive
- https://www.crowdstrike.com/blog/shlayer-malvertising-campaigns-still-using-flash-update-disguise/ - webarchive
- https://www.crowdstrike.com/blog/how-crowdstrike-analyzes-macos-malware-to-optimize-automated-detection-capabilities - webarchive
- https://www.jamf.com/blog/shlayer-malware-abusing-gatekeeper-bypass-on-macos/ - webarchive
- https://cedowens.medium.com/macos-gatekeeper-bypass-2021-edition-5256a2955508 - webarchive
- https://threatpost.com/shlayer-mac-youtube-wikipedia/152146/ - webarchive
- https://resource.redcanary.com/rs/003-YRU-314/images/2021-Threat-Detection-Report.pdf - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Silver Sparrow
According to Red Canary, Silver Sparrow is an activity cluster that includes a binary compiled to run on Apple’s new M1 chips but has been distributed without payload so far.
Internal MISP references
UUID f6a7aeeb-fcc5-4d26-9eab-c0b6e2819a6c
which can be used as unique global reference for Silver Sparrow
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
SimpleTea (OS X)
SimpleTea is a RAT for macOS that is based on the same object-oriented project as SimpleTea for Linux (SimplexTea).
It also shares similarities with POOLRAT (also known as SIMPLESEA), like the supported commands or a single-byte XOR encryption of its configuration. However, the indices of commands are different.
SimpleTea for macOS was uploaded to VirusTotal from Hong Kong and China in September 2023.
Internal MISP references
UUID ce384804-8580-4d57-97b3-bde0d903f703
which can be used as unique global reference for SimpleTea (OS X)
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
SpectralBlur (OS X)
Internal MISP references
UUID c7c32006-a2d1-4bc2-8a25-84c07286464a
which can be used as unique global reference for SpectralBlur (OS X)
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
SUGARLOADER
Internal MISP references
UUID 171501fd-d504-4257-9c3d-fbc066d6eeba
which can be used as unique global reference for SUGARLOADER
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
SysJoker (OS X)
Internal MISP references
UUID 5bffe0fe-22f6-4d18-9372-f8c5d262d852
which can be used as unique global reference for SysJoker (OS X)
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/osx.sysjoker - webarchive
- https://www.sentinelone.com/blog/sneaky-spies-and-backdoor-rats-sysjoker-and-dazzlespy-malware-target-macos/ - webarchive
- https://blogs.vmware.com/security/2022/03/%e2%80%afsysjoker-an-analysis-of-a-multi-os-rat.html - webarchive
- https://www.bleepingcomputer.com/news/security/new-sysjoker-backdoor-targets-windows-macos-and-linux/ - webarchive
- https://www.intezer.com/blog/malware-analysis/new-backdoor-sysjoker/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
systemd
General purpose backdoor
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular systemd.
Known Synonyms |
---|
Demsty |
ReverseWindow |
Internal MISP references
UUID a8e7687b-9db7-4606-ba81-320d36099e3a
which can be used as unique global reference for systemd
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Tsunami (OS X)
Internal MISP references
UUID 59d4a2f3-c66e-4576-80ab-e04a4b0a4317
which can be used as unique global reference for Tsunami (OS X)
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Unidentified macOS 001 (UnionCryptoTrader)
Internal MISP references
UUID 1c96f6b9-6b78-4137-9d5f-aa5575f80daa
which can be used as unique global reference for Unidentified macOS 001 (UnionCryptoTrader)
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/osx.unidentified_001 - webarchive
- https://us-cert.cisa.gov/ncas/analysis-reports/ar21-048c - webarchive
- https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/lazarus-north-korea-indictment - webarchive
- https://securelist.com/operation-applejeus-sequel/95596/ - webarchive
- https://objective-see.com/blog/blog_0x51.html - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
UpdateAgent
Internal MISP references
UUID 1f1bc885-5987-41fa-bb04-8775eeb45d88
which can be used as unique global reference for UpdateAgent
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/osx.update_agent - webarchive
- https://twitter.com/sysopfb/status/1532442456343691273 - webarchive
- https://www.jamf.com/blog/updateagent-adapts-again/ - webarchive
- https://www.esentire.com/blog/updateagent-macos-malware - webarchive
- https://www.microsoft.com/security/blog/2022/02/02/the-evolution-of-a-mac-trojan-updateagents-progression/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Uroburos (OS X)
Internal MISP references
UUID 13173d75-45f0-4183-8e18-554a5781405c
which can be used as unique global reference for Uroburos (OS X)
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Vigram
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Vigram.
Known Synonyms |
---|
WizardUpdate |
Internal MISP references
UUID 021e2fb4-1744-4fde-8d59-b247f1b34062
which can be used as unique global reference for Vigram
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/osx.vigram - webarchive
- https://twitter.com/MsftSecIntel/status/1451279679059488773 - webarchive
- https://www.sentinelone.com/labs/the-art-and-science-of-macos-malware-hunting-with-radare2-leveraging-xrefs-yara-and-zignatures/ - webarchive
- https://twitter.com/ConfiantIntel/status/1351559054565535745 - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
WatchCat
Internal MISP references
UUID a73468d5-2dee-4828-8bbb-c37ea9295584
which can be used as unique global reference for WatchCat
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
WindTail
Internal MISP references
UUID 48751182-0b17-4326-8a72-41e4c4be35e7
which can be used as unique global reference for WindTail
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/osx.windtail - webarchive
- https://gsec.hitb.org/materials/sg2018/D1%20COMMSEC%20-%20In%20the%20Trails%20of%20WINDSHIFT%20APT%20-%20Taha%20Karim.pdf - webarchive
- https://www.virusbulletin.com/virusbulletin/2020/04/vb2019-paper-cyber-espionage-middle-east-unravelling-osxwindtail/ - webarchive
- https://posts.specterops.io/introducing-venator-a-macos-tool-for-proactive-detection-34055a017e56 - webarchive
- https://www.forbes.com/sites/thomasbrewster/2018/08/30/apple-mac-loophole-breached-in-middle-east-hacks/ - webarchive
- https://objective-see.com/blog/blog_0x3B.html - webarchive
- https://www.sans.org/cyber-security-summit/archives/file/summit-archive-1554718868.pdf - webarchive
- https://objective-see.com/blog/blog_0x3D.html - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Winnti (OS X)
Internal MISP references
UUID 5aede44b-1a30-4062-bb97-ac9f4985ddb6
which can be used as unique global reference for Winnti (OS X)
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
WireLurker (OS X)
Internal MISP references
UUID bc32df24-8e80-44bc-80b0-6a4d55661aa5
which can be used as unique global reference for WireLurker (OS X)
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Wirenet (OS X)
Internal MISP references
UUID f99ef0dc-9e96-42e0-bbfe-3616b3786629
which can be used as unique global reference for Wirenet (OS X)
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
X-Agent (OS X)
Internal MISP references
UUID 858f4396-8bc9-4df8-9370-490bbb3b4535
which can be used as unique global reference for X-Agent (OS X)
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/osx.xagent - webarchive
- https://download.bitdefender.com/resources/files/News/CaseStudies/study/143/Bitdefender-Whitepaper-APT-Mac-A4-en-EN-web.pdf - webarchive
- http://researchcenter.paloaltonetworks.com/2017/02/unit42-xagentosx-sofacys-xagent-macos-tool/ - webarchive
- https://www.secureworks.com/research/threat-profiles/iron-twilight - webarchive
- https://twitter.com/PhysicalDrive0/status/845009226388918273 - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
XCSSET
Internal MISP references
UUID 041aee7f-cb7a-4199-9fe5-494801a18273
which can be used as unique global reference for XCSSET
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/osx.xcsset - webarchive
- https://blog.trendmicro.com/trendlabs-security-intelligence/xcsset-mac-malware-infects-xcode-projects-performs-uxss-attack-on-safari-other-browsers-leverages-zero-day-exploits/ - webarchive
- https://www.jamf.com/blog/zero-day-tcc-bypass-discovered-in-xcsset-malware/ - webarchive
- https://objective-see.com/blog/blog_0x5F.html - webarchive
- https://www.crowdstrike.com/blog/how-crowdstrike-analyzes-macos-malware-to-optimize-automated-detection-capabilities - webarchive
- https://www.trendmicro.com/en_us/research/21/g/updated-xcsset-malware-targets-telegram--other-apps.html - webarchive
- https://documents.trendmicro.com/assets/pdf/XCSSET_Technical_Brief.pdf - webarchive
- https://securelist.com/malware-for-the-new-apple-silicon-platform/101137/ - webarchive
- https://www.trendmicro.com/en_us/research/21/d/xcsset-quickly-adapts-to-macos-11-and-m1-based-macs.html - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Xloader
Xloader is a Rebranding of Formbook malware (mainly a stealer), available for macOS as well.
Formbook has a "magic"-value FBNG (FormBook-NG), while Xloader has a "magic"-value XLNG (XLoader-NG). This "magic"-value XLNG is platform-independent.
Not to be confused with apk.xloader or ios.xloader.
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Xloader.
Known Synonyms |
---|
Formbook |
Internal MISP references
UUID d5f2f6ad-2ed0-42d4-9116-f95eea2ab543
which can be used as unique global reference for Xloader
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/osx.xloader - webarchive
- https://research.checkpoint.com/2021/time-proven-tricks-in-a-new-environment-the-macos-evolution-of-formbook/ - webarchive
- https://www.sentinelone.com/blog/xloaders-latest-trick-new-macos-variant-disguised-as-signed-officenote-app/ - webarchive
- https://medium.com/@shaddy43/layers-of-deception-analyzing-the-complex-stages-of-xloader-4-3-malware-evolution-2dcb550b98d9 - webarchive
- https://blog.malwarebytes.com/mac/2021/07/osx-xloader-hides-little-except-its-main-purpose-what-we-learned-in-the-installation-process/ - webarchive
- https://www.lac.co.jp/lacwatch/report/20220307_002893.html - webarchive
- https://www.sentinelone.com/blog/detecting-xloader-a-macos-malware-as-a-service-info-stealer-and-keylogger/ - webarchive
- https://cip.gov.ua/en/news/khto-stoyit-za-kiberatakami-na-ukrayinsku-kritichnu-informaciinu-infrastrukturu-statistika-15-22-bereznya - webarchive
- https://www.vmray.com/cyber-security-blog/malware-analysis-spotlight-xbinder-xloader/ - webarchive
- https://research.checkpoint.com/2022/xloader-botnet-find-me-if-you-can/ - webarchive
- https://twitter.com/krabsonsecurity/status/1319463908952969216 - webarchive
- https://www.zscaler.com/blogs/security-research/analysis-xloaders-c2-network-encryption - webarchive
- https://malwarebookreports.com/cross-platform-java-dropper-snake-and-xloader-mac-version/ - webarchive
- https://blogs.blackberry.com/en/2021/09/threat-thursday-xloader-infostealer - webarchive
- https://research.checkpoint.com/2021/top-prevalent-malware-with-a-thousand-campaigns-migrates-to-macos/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
XSLCmd
Internal MISP references
UUID 120a5890-dc3e-42e8-950e-b5ff9a849d2a
which can be used as unique global reference for XSLCmd
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Yort
Internal MISP references
UUID 725cd3eb-1025-4da3-bcb1-a7b6591c632b
which can be used as unique global reference for Yort
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
ZuRu
A malware that was observed being embedded alongside legitimate applications (such as iTerm2) offered for download on suspicious websites pushed in search engines. It uses a Python script to perform reconnaissance on the compromised system an pulls additional payload(s).
Internal MISP references
UUID bd293592-d2dd-4fdd-88e7-6098e0bbb043
which can be used as unique global reference for ZuRu
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Ani-Shell
Ani-Shell is a simple PHP shell with some unique features like Mass Mailer, a simple Web-Server Fuzzer, Dosser, Back Connect, Bind Shell, Back Connect, Auto Rooter etc.
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Ani-Shell.
Known Synonyms |
---|
anishell |
Internal MISP references
UUID 7ef3c0fd-8736-47b1-8ced-ca7bf6d27471
which can be used as unique global reference for Ani-Shell
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
ANTAK
Antak is a webshell written in ASP.Net which utilizes PowerShell.
Internal MISP references
UUID 88a71ca8-d99f-416a-ad29-5af12212008c
which can be used as unique global reference for ANTAK
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/php.antak - webarchive
- https://github.com/samratashok/nishang/blob/master/Antak-WebShell/antak.aspx - webarchive
- https://summit.fireeye.com/content/dam/fireeye-www/summit/cds-2018/presentations/cds18-technical-s05-att&cking-fin7.pdf - webarchive
- http://www.labofapenetrationtester.com/2014/06/introducing-antak.html - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
ASPXSpy
Internal MISP references
UUID 4d1c01be-76ad-42dd-b094-7a8dbaf02159
which can be used as unique global reference for ASPXSpy
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/php.aspxspy - webarchive
- https://attack.mitre.org/groups/G0096 - webarchive
- https://asec.ahnlab.com/en/47455/ - webarchive
- https://securelist.com/defttorero-tactics-techniques-and-procedures/107610/ - webarchive
- https://www.recordedfuture.com/full-spectrum-detections-five-popular-web-shells - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Behinder
A webshell for multiple web languages (asp/aspx, jsp/jspx, php), openly distributed through Github.
Internal MISP references
UUID 5e5cd3a6-0348-4c6b-94b1-13ca0d845547
which can be used as unique global reference for Behinder
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/php.behinder - webarchive
- https://www.elastic.co/security-labs/ref2924-howto-maintain-persistence-as-an-advanced-threat - webarchive
- https://github.com/hktalent/MyDocs/blob/main/BehinderShell.md - webarchive
- https://blog.gigamon.com/2022/09/28/investigating-web-shells/ - webarchive
- https://cyberandramen.net/2022/02/18/a-tale-of-two-shells/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
c99shell
C99shell is a PHP backdoor that provides a lot of functionality, for example:
- run shell commands;
- download/upload files from and to the server (FTP functionality);
- full access to all files on the hard disk;
- self-delete functionality.
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular c99shell.
Known Synonyms |
---|
c99 |
Internal MISP references
UUID cd1b8ec2-dbbd-4e73-b9a7-1bd1287a68f2
which can be used as unique global reference for c99shell
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
DEWMODE
FireEye discovered the DEWMODE webshell starting mid-December 2020 after exploitation of zero-day vulnerabilities in Accellion's File Transfer Appliance. It is a PHP webshell that allows threat actors to view and download files in the victim machine. It also contains cleanup function to remove itself and clean the Apache log.
Internal MISP references
UUID a782aac8-168d-4691-a182-237d7d473e21
which can be used as unique global reference for DEWMODE
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/php.dewmode - webarchive
- https://www.fireeye.com/blog/threat-research/2021/02/accellion-fta-exploited-for-data-theft-and-extortion.html - webarchive
- https://go.recordedfuture.com/hubfs/reports/mtp-2021-0312.pdf - webarchive
- https://www.accellion.com/sites/default/files/trust-center/accellion-fta-attack-mandiant-report-full.pdf - webarchive
- https://us-cert.cisa.gov/ncas/analysis-reports/ar21-055a - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Ensikology
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Ensikology.
Known Synonyms |
---|
Ensiko |
Internal MISP references
UUID dfd8deac-ce86-4a22-b462-041c19d62506
which can be used as unique global reference for Ensikology
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
p0wnyshell
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular p0wnyshell.
Known Synonyms |
---|
Ponyshell |
Pownyshell |
Internal MISP references
UUID a6d13ffe-1b1a-46fe-afd9-989e8dec3773
which can be used as unique global reference for p0wnyshell
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Parrot TDS WebShell
In combination with Parrot TDS the usage of a classical web shell was observed by DECODED Avast.io.
Internal MISP references
UUID c9e7c5a6-9082-47ec-89eb-477980e73dcb
which can be used as unique global reference for Parrot TDS WebShell
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
PAS
Internal MISP references
UUID e6a40fa2-f79f-40e9-89d3-a56984bc51f7
which can be used as unique global reference for PAS
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/php.pas - webarchive
- https://securelist.com/apt-trends-report-q1-2021/101967/ - webarchive
- https://blog.erratasec.com/2016/12/some-notes-on-iocs.html - webarchive
- https://www.us-cert.gov/security-publications/GRIZZLY-STEPPE-Russian-Malicious-Cyber-Activity - webarchive
- https://www.domaintools.com/resources/blog/centreon-to-exim-and-back-on-the-trail-of-sandworm - webarchive
- https://www.cert.ssi.gouv.fr/uploads/CERTFR-2021-CTI-005.pdf - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Prometheus Backdoor
Backdoor written in php
Internal MISP references
UUID b4007b02-106d-420f-af1c-76c035843fd2
which can be used as unique global reference for Prometheus Backdoor
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
RedHat Hacker WebShell
Internal MISP references
UUID e94a5b44-f2c2-41dc-8abb-6de69eb38241
which can be used as unique global reference for RedHat Hacker WebShell
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
WSO
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular WSO.
Known Synonyms |
---|
Webshell by Orb |
Internal MISP references
UUID 7f3794fc-662e-4dde-b793-49bcaccc96f7
which can be used as unique global reference for WSO
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/php.wso - webarchive
- https://securelist.com/energetic-bear-crouching-yeti/85345/ - webarchive
- https://www.aquasec.com/blog/loony-tunables-vulnerability-exploited-by-kinsing/ - webarchive
- https://www.mandiant.com/resources/cloud-metadata-abuse-unc2903 - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Silence DDoS
Internal MISP references
UUID b5cc7a39-305b-487e-b15a-02dcebefce90
which can be used as unique global reference for Silence DDoS
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
BlackSun
Ransomware.
Internal MISP references
UUID 1fcc4425-6e14-47e6-8434-745cf1bc9982
which can be used as unique global reference for BlackSun
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
BONDUPDATER
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular BONDUPDATER.
Known Synonyms |
---|
Glimpse |
Poison Frog |
Internal MISP references
UUID 99600ba5-30a0-4ac8-8583-6288760b77c3
which can be used as unique global reference for BONDUPDATER
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/ps1.bondupdater - webarchive
- https://researchcenter.paloaltonetworks.com/2018/09/unit42-oilrig-uses-updated-bondupdater-target-middle-eastern-government/ - webarchive
- https://www.boozallen.com/s/insight/blog/dark-labs-discovers-apt34-malware-variants.html?cid=spo-csatb-2 - webarchive
- https://www.zdnet.com/article/source-code-of-iranian-cyber-espionage-tools-leaked-on-telegram/ - webarchive
- https://cyware.com/blog/apt34-the-helix-kitten-cybercriminal-group-loves-to-meow-middle-eastern-and-international-organizations-48ae - webarchive
- https://ironnet.com/blog/chirp-of-the-poisonfrog/ - webarchive
- https://blog.0day.rocks/hacking-back-and-influence-operations-85cd52c1e933 - webarchive
- https://unit42.paloaltonetworks.com/behind-the-scenes-with-oilrig/ - webarchive
- https://ti.qianxin.com/uploads/2020/02/13/cb78386a082f465f259b37dae5df4884.pdf - webarchive
- https://www.netscout.com/blog/asert/tunneling-under-sands - webarchive
- https://unit42.paloaltonetworks.com/dns-tunneling-in-the-wild-overview-of-oilrigs-dns-tunneling/ - webarchive
- https://www.secureworks.com/research/threat-profiles/cobalt-gypsy - webarchive
- https://nsfocusglobal.com/apt34-event-analysis-report/ - webarchive
- https://marcoramilli.com/2019/05/02/apt34-glimpse-project/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
CASHY200
Internal MISP references
UUID 7373c789-2dc2-4867-9c60-fa68f8d971a2
which can be used as unique global reference for CASHY200
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
EugenLoader
A loader written in Powershell, usually delivered packaged in MSI/MSIX files.
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular EugenLoader.
Known Synonyms |
---|
FakeBat |
NUMOZYLOD |
PaykLoader |
Internal MISP references
UUID cf9c14cf-6246-4858-8bcc-5a943c8df715
which can be used as unique global reference for EugenLoader
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/ps1.eugenloader - webarchive
- https://www.googlecloudcommunity.com/gc/Community-Blog/Finding-Malware-Unveiling-NUMOZYLOD-with-Google-Security/ba-p/789551 - webarchive
- https://www.rewterz.com/rewterz-news/rewterz-threat-alert-widely-abused-msix-app-installer-disabled-by-microsoft-active-iocs - webarchive
- https://intel471.com/blog/malvertising-surges-to-distribute-malware - webarchive
- https://esentire-dot-com-assets.s3.amazonaws.com/assets/resourcefiles/eSentire-Unraveling_BatLoader_and_FakeBat.pdf - webarchive
- https://blog.sekoia.io/exposing-fakebat-loader-distribution-methods-and-adversary-infrastructure/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
FlowerPower
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular FlowerPower.
Known Synonyms |
---|
BoBoStealer |
Internal MISP references
UUID 6f0f034a-13f1-432d-bc70-f78d7f27f46f
which can be used as unique global reference for FlowerPower
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/ps1.flowerpower - webarchive
- https://i.blackhat.com/asia-21/Friday-Handouts/as-21-Kuo-We-Are-About-To-Land-How-CloudDragon-Turns-A-Nightmare-Into-Reality.pdf - webarchive
- https://www.youtube.com/watch?v=rfzmHjZX70s - webarchive
- https://www.pwc.co.uk/cyber-security/pdf/pwc-cyber-threats-2020-a-year-in-retrospect.pdf - webarchive
- https://vblocalhost.com/uploads/VB2020-46.pdf - webarchive
- https://vb2020.vblocalhost.com/uploads/VB2020-46.pdf - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
FRat Loader
Loader used to deliver FRat (see family windows.frat)
Internal MISP references
UUID 385a3dca-263d-46be-b84d-5dc09ee466d9
which can be used as unique global reference for FRat Loader
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
FTCODE
The malware ftcode is a ransomware which encrypts files and changes their extension into .FTCODE. It later asks for a ransom in order to release the decryption key, mandatory to recover your files. It is infamous for attacking Italy pretending to be a notorious telecom provider asking for due payments.
Internal MISP references
UUID f727a05e-c1cd-4e95-b0bf-2a4bb64aa850
which can be used as unique global reference for FTCODE
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/ps1.ftcode - webarchive
- https://nakedsecurity.sophos.com/2013/03/05/russian-ransomware-windows-powershell/ - webarchive
- https://www.certego.net/en/news/malware-tales-ftcode/ - webarchive
- https://www.kpn.com/security-blogs/FTCODE-taking-over-a-portion-of-the-botnet.htm - webarchive
- https://www.certego.net/en/news/ftdecryptor-a-simple-password-based-ftcode-decryptor/ - webarchive
- https://github.com/StrangerealIntel/CyberThreatIntel/blob/master/Additional%20Analysis/Unknown/2020-06-22/Analysis.md - webarchive
- https://dissectingmalwa.re/nicht-so-goot-breaking-down-gootkit-and-jasper-ftcode.html - webarchive
- https://www.zscaler.com/blogs/research/ftcode-ransomware--new-version-includes-stealing-capabilities - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
GhostMiner
Internal MISP references
UUID 0db05333-2214-49c3-b469-927788932aaa
which can be used as unique global reference for GhostMiner
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/ps1.ghostminer - webarchive
- https://blog.trendmicro.com/trendlabs-security-intelligence/fileless-cryptocurrency-miner-ghostminer-weaponizes-wmi-objects-kills-other-cryptocurrency-mining-payloads/ - webarchive
- https://research.checkpoint.com/malware-against-the-c-monoculture/ - webarchive
- https://blog.minerva-labs.com/ghostminer-cryptomining-malware-goes-fileless - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
HTTP-Shell
The author describes this open source shell as follows. HTTP-Shell is Multiplatform Reverse Shell. This tool helps you to obtain a shell-like interface on a reverse connection over HTTP. Unlike other reverse shells, the main goal of the tool is to use it in conjunction with Microsoft Dev Tunnels, in order to get a connection as close as possible to a legitimate one.
This shell is not fully interactive, but displays any errors on screen (both Windows and Linux), is capable of uploading and downloading files, has command history, terminal cleanup (even with CTRL+L), automatic reconnection, movement between directories and supports sudo (or sudo su) on Linux-based OS.
Internal MISP references
UUID 50b94b67-dc2a-4953-a354-edf2cc4e17d3
which can be used as unique global reference for HTTP-Shell
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
JasperLoader
Internal MISP references
UUID 286a14a1-7113-4bed-97ce-8db41b312a51
which can be used as unique global reference for JasperLoader
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/ps1.jasperloader - webarchive
- https://blog.threatstop.com/upgraded-jasperloader-infecting-machines - webarchive
- https://blog.talosintelligence.com/2019/04/jasperloader-targets-italy.html - webarchive
- https://dissectingmalwa.re/nicht-so-goot-breaking-down-gootkit-and-jasper-ftcode.html - webarchive
- https://blog.talosintelligence.com/2019/05/sorpresa-jasperloader.html - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Lazyscripter
Internal MISP references
UUID 74e5711e-b777-4f09-a4bc-db58d5e23e29
which can be used as unique global reference for Lazyscripter
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
LightBot
According to Bleeping Computer and Vitali Kremez, LightBot is a compact reconnaissance tool suspected to be used to identify high-value targets for potential follow-up ransomware attacks.
Internal MISP references
UUID 319c4b4f-2901-412c-8fa5-70be75ba51cb
which can be used as unique global reference for LightBot
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Octopus (Powershell)
The author describes Octopus as an "open source, pre-operation C2 server based on python which can control an Octopus powershell agent through HTTP/S."
It is different from the malware win.octopus written in Delphi and attributed to DustSquad by Kaspersky Labs.
Internal MISP references
UUID c3ca7a89-a885-444a-8642-31019b34b027
which can be used as unique global reference for Octopus (Powershell)
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/ps1.octopus - webarchive
- https://isc.sans.edu/diary/rss/28628 - webarchive
- https://isc.sans.edu/diary/26918 - webarchive
- https://resources.malwarebytes.com/files/2021/02/LazyScripter.pdf - webarchive
- https://go.recordedfuture.com/hubfs/reports/cta-2021-0107.pdf - webarchive
- https://github.com/mhaskar/Octopus - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
OilRig
Internal MISP references
UUID 4a3b9669-8f91-47df-a8bf-a9876ab8edf3
which can be used as unique global reference for OilRig
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/ps1.oilrig - webarchive
- https://www.vkremez.com/2018/03/investigating-iranian-threat-group.html - webarchive
- https://threatpost.com/oilrig-apt-unique-backdoor/157646/ - webarchive
- https://twitter.com/MJDutch/status/1074820959784321026?s=19 - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
PhonyC2
Internal MISP references
UUID c630e510-a0ad-405a-9aeb-9d8057b6a868
which can be used as unique global reference for PhonyC2
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/ps1.phonyc2 - webarchive
- https://www.deepinstinct.com/blog/phonyc2-revealing-a-new-malicious-command-control-framework-by-muddywater - webarchive
- https://www.deepinstinct.com/blog/muddyc2go-latest-c2-framework-used-by-iranian-apt-muddywater-spotted-in-israel - webarchive
- https://circleid.com/posts/20230824-signs-of-muddywater-developments-found-in-the-dns - webarchive
- https://www.deepinstinct.com/blog/muddywater-en-able-spear-phishing-with-new-ttps - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
POSHSPY
Internal MISP references
UUID 4df1b257-c242-46b0-b120-591430066b6f
which can be used as unique global reference for POSHSPY
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
PowerBrace
Internal MISP references
UUID 7b334343-0045-4d65-b28a-ebf912c7aafc
which can be used as unique global reference for PowerBrace
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
PowerHarbor
PowerHarbor is a modular PowerShell-based malware that consists of various modules. The primary module maintains constant communication with the C2 server, executing and deleting additional modules received from it. Currently, the communication with the C2 server is encrypted using RSA encryption and hardcoded key data. Moreover, the main module incorporates virtual machine (VM) detection capabilities. The StealData module employs the Invoke-Stealer function as its core, enabling the theft of system information, browser-stored credentials, cryptocurrency wallet details, and credentials for various applications like Telegram, FileZilla, and WinSCP.
Internal MISP references
UUID 73b40a4c-9163-4a07-bf1b-e4a4344ac63a
which can be used as unique global reference for PowerHarbor
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
PowerPepper
Internal MISP references
UUID 6544c75b-809f-4d31-a235-8906d4004828
which can be used as unique global reference for PowerPepper
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
POWERPIPE
Internal MISP references
UUID 60d7f668-66b6-401b-976f-918470a23c3d
which can be used as unique global reference for POWERPIPE
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/ps1.powerpipe - webarchive
- https://www.fireeye.com/blog/threat-research/2018/08/fin7-pursuing-an-enigmatic-and-evasive-global-criminal-operation.html - webarchive
- https://summit.fireeye.com/content/dam/fireeye-www/summit/cds-2018/presentations/cds18-technical-s05-att&cking-fin7.pdf - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
POWERPLANT
This powershell code is a PowerShell written backdoor used by FIN7. Regarding to Mandiant that is was revealed to be a "vast backdoor framework with a breadth of capabilities, depending on which modules are delivered from the C2 server."
Internal MISP references
UUID 697626d3-04a1-4426-aeae-d7054c6e78fb
which can be used as unique global reference for POWERPLANT
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
powershell_web_backdoor
Internal MISP references
UUID 4310dcab-0820-4bc1-8a0b-9691c20f5b49
which can be used as unique global reference for powershell_web_backdoor
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
PowerShortShell
Internal MISP references
UUID f2198153-2d8b-49ed-b8a8-0952c289b8c0
which can be used as unique global reference for PowerShortShell
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
PowerShower
Internal MISP references
UUID 0959a02e-6eba-43dc-bbbf-b2c7488e9371
which can be used as unique global reference for PowerShower
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/ps1.powershower - webarchive
- https://unit42.paloaltonetworks.com/atoms/clean-ursa - webarchive
- https://securelist.com/recent-cloud-atlas-activity/92016/ - webarchive
- https://unit42.paloaltonetworks.com/atoms/clean-ursa/ - webarchive
- https://attack.mitre.org/groups/G0100/ - webarchive
- https://unit42.paloaltonetworks.com/unit42-inception-attackers-target-europe-year-old-office-vulnerability - webarchive
- https://unit42.paloaltonetworks.com/unit42-inception-attackers-target-europe-year-old-office-vulnerability/ - webarchive
- https://securelist.com/recent-cloud-atlas-activity/92016 - webarchive
- https://attack.mitre.org/groups/G0100 - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
POWERSOURCE
POWERSOURCE is a heavily obfuscated and modified version of the publicly available tool DNS_TXT_Pwnage. The backdoor uses DNS TXT requests for command and control and is installed in the registry or Alternate Data Streams.
Internal MISP references
UUID a4584181-f739-43d1-ade9-8a7aa21278a0
which can be used as unique global reference for POWERSOURCE
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/ps1.powersource - webarchive
- https://cocomelonc.github.io/malware/2023/07/26/malware-tricks-35.html - webarchive
- https://cert.ssi.gouv.fr/uploads/20220427_NP_TLPWHITE_ANSSI_FIN7.pdf - webarchive
- https://www.fireeye.com/blog/threat-research/2017/03/fin7_spear_phishing.html - webarchive
- https://summit.fireeye.com/content/dam/fireeye-www/summit/cds-2018/presentations/cds18-technical-s05-att&cking-fin7.pdf - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
PowerSpritz
Internal MISP references
UUID c07f6484-0669-44b7-90e6-f642e316d277
which can be used as unique global reference for PowerSpritz
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
POWERSTAR
Internal MISP references
UUID 60e11a7b-8452-4177-b709-99ef0976c296
which can be used as unique global reference for POWERSTAR
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
POWERSTATS
POWERSTATS is a backdoor written in powershell. It has the ability to disable Microsoft Office Protected View, fingerprint the victim and receive commands.
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular POWERSTATS.
Known Synonyms |
---|
Valyria |
Internal MISP references
UUID b81d91b5-23a4-4f86-aea9-3f212169fce9
which can be used as unique global reference for POWERSTATS
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/ps1.powerstats - webarchive
- https://blog.prevailion.com/2020/01/summer-mirage.html - webarchive
- https://unit42.paloaltonetworks.com/atoms/boggyserpens/ - webarchive
- https://unit42.paloaltonetworks.com/unit42-muddying-the-water-targeted-attacks-in-the-middle-east/ - webarchive
- https://www.inforisktoday.com/muddywater-targets-critical-infrastructure-in-asia-europe-a-18611 - webarchive
- https://www.fireeye.com/blog/threat-research/2018/03/iranian-threat-group-updates-ttps-in-spear-phishing-campaign.html - webarchive
- https://sec0wn.blogspot.com/2018/02/burping-on-muddywater.html - webarchive
- https://sec0wn.blogspot.com/2018/05/clearing-muddywater-analysis-of-new.html - webarchive
- https://www.clearskysec.com/wp-content/uploads/2019/06/Clearsky-Iranian-APT-group-%E2%80%98MuddyWater%E2%80%99-Adds-Exploits-to-Their-Arsenal.pdf - webarchive
- https://www.clearskysec.com/muddywater-operations-in-lebanon-and-oman/ - webarchive
- https://www.secureworks.com/research/threat-profiles/cobalt-ulster - webarchive
- https://blog.trendmicro.com/trendlabs-security-intelligence/campaign-possibly-connected-muddywater-surfaces-middle-east-central-asia/ - webarchive
- https://marcoramilli.com/2020/01/15/iranian-threat-actors-preliminary-analysis/ - webarchive
- https://research.checkpoint.com/2019/the-muddy-waters-of-apt-attacks/ - webarchive
- https://sec0wn.blogspot.com/2017/10/continued-activity-targeting-middle-east.html - webarchive
- https://www.group-ib.com/blog/muddywater/ - webarchive
- https://securelist.com/apt-trends-report-q2-2019/91897/ - webarchive
- https://shells.systems/reviving-leaked-muddyc3-used-by-muddywater-apt/ - webarchive
- https://reaqta.com/2017/11/muddywater-apt-targeting-middle-east/ - webarchive
- https://www.cisa.gov/uscert/ncas/alerts/aa22-055a - webarchive
- https://www.cisa.gov/uscert/sites/default/files/publications/AA22-055A_Iranian_Government-Sponsored_Actors_Conduct_Cyber_Operations.pdf - webarchive
- https://www.clearskysec.com/muddywater-targets-kurdish-groups-turkish-orgs/ - webarchive
- http://www.secureworks.com/research/threat-profiles/cobalt-ulster - webarchive
- https://www.deepinstinct.com/blog/phonyc2-revealing-a-new-malicious-command-control-framework-by-muddywater - webarchive
- https://blog.trendmicro.com/trendlabs-security-intelligence/muddywater-resurfaces-uses-multi-stage-backdoor-powerstats-v3-and-new-post-exploitation-tools/ - webarchive
- https://thehackernews.com/2022/02/irans-muddywater-hacker-group-using-new.html - webarchive
- https://web.archive.org/web/20180807105755/https://www.sekoia.fr/blog/falling-on-muddywater/ - webarchive
- https://mp.weixin.qq.com/s/NN_iRvwA6yOHFS9Z3A0RBA - webarchive
- https://blog.malwarebytes.com/threat-analysis/2017/09/elaborate-scripting-fu-used-in-espionage-attack-against-saudi-arabia-government_entity/ - webarchive
- https://sec0wn.blogspot.com/2018/03/a-quick-dip-into-muddywaters-recent.html - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
POWERTON
Internal MISP references
UUID 08d5b8a4-e752-48f3-ac6d-944807146ce7
which can be used as unique global reference for POWERTON
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/ps1.powerton - webarchive
- https://www.microsoft.com/security/blog/2020/06/18/inside-microsoft-threat-protection-mapping-attack-chains-from-cloud-to-endpoint/ - webarchive
- https://norfolkinfosec.com/apt33-powershell-malware/ - webarchive
- https://blog.telsy.com/meeting-powerband-the-apt33-net-powerton-variant/ - webarchive
- https://www.secureworks.com/research/threat-profiles/cobalt-trinity - webarchive
- https://www.fireeye.com/blog/threat-research/2018/12/overruled-containing-a-potentially-destructive-adversary.html - webarchive
- https://www.fireeye.com/blog/threat-research/2020/07/scandalous-external-detection-using-network-scan-data-and-automation.html - webarchive
- https://www.symantec.com/security-center/writeup/2019-062513-4935-99 - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
POWERTRASH
This PowerShell written malware is an in-memory dropper used by FIN7 to execute the included/embedded payload. According to Mandiant's blog article: "POWERTRASH is a uniquely obfuscated iteration of a shellcode invoker included in the PowerSploit framework available on GitHub."
Internal MISP references
UUID ff20d720-285e-4168-ac8c-86a7f9ac18d4
which can be used as unique global reference for POWERTRASH
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/ps1.powertrash - webarchive
- https://www.rewterz.com/rewterz-news/rewterz-threat-alert-widely-abused-msix-app-installer-disabled-by-microsoft-active-iocs - webarchive
- https://www.mandiant.com/resources/blog/evolution-of-fin7 - webarchive
- https://www.mandiant.com/resources/evolution-of-fin7 - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
PowerWare
Internal MISP references
UUID 5c5beab9-614c-4c86-b369-086234ddb43c
which can be used as unique global reference for PowerWare
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
PowerZure
PowerZure is a PowerShell project created to assess and exploit resources within Microsoft’s cloud platform, Azure. PowerZure was created out of the need for a framework that can both perform reconnaissance and exploitation of Azure, AzureAD, and the associated resources.
Internal MISP references
UUID f5fa77e9-9851-48a6-864d-e0448de062d4
which can be used as unique global reference for PowerZure
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
PowerMagic
Internal MISP references
UUID 7ee51054-1d3b-45ec-a7fd-1e212c891b99
which can be used as unique global reference for PowerMagic
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/ps1.power_magic - webarchive
- https://securelist.com/bad-magic-apt/109087/ - webarchive
- https://securelist.com/cloudwizard-apt/109722/ - webarchive
- https://www.malwarebytes.com/blog/threat-intelligence/2023/05/redstinger - webarchive
- https://securelist.com/bad-magic-apt/109087/?s=31 - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
PowerRAT
Internal MISP references
UUID 970bdeaf-bc34-458a-ae67-8c3578e8663d
which can be used as unique global reference for PowerRAT
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
PowGoop
DLL loader that decrypts and runs a powershell-based downloader.
Internal MISP references
UUID d8429f6d-dc4b-4aae-930d-234156dbf354
which can be used as unique global reference for PowGoop
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/ps1.powgoop - webarchive
- https://www.cisa.gov/uscert/sites/default/files/publications/AA22-055A_Iranian_Government-Sponsored_Actors_Conduct_Cyber_Operations.pdf - webarchive
- https://www.security.ntt/blog/analysis-of-an-iranian-apts-e400-powgoop-variant - webarchive
- https://thehackernews.com/2022/02/irans-muddywater-hacker-group-using-new.html - webarchive
- https://www.inforisktoday.com/muddywater-targets-critical-infrastructure-in-asia-europe-a-18611 - webarchive
- https://www.cybercom.mil/Media/News/Article/2897570/iranian-intel-cyber-suite-of-malware-uses-open-source-tools/ - webarchive
- https://www.sentinelone.com/labs/wading-through-muddy-waters-recent-activity-of-an-iranian-state-sponsored-threat-actor/ - webarchive
- https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/seedworm-apt-iran-middle-east - webarchive
- https://www.clearskysec.com/wp-content/uploads/2020/10/Operation-Quicksand.pdf - webarchive
- https://www.cyberscoop.com/muddywater-iran-symantec-middle-east/ - webarchive
- https://www.pwc.co.uk/cyber-security/pdf/pwc-cyber-threats-2020-a-year-in-retrospect.pdf - webarchive
- https://unit42.paloaltonetworks.com/thanos-ransomware/ - webarchive
- https://www.cisa.gov/uscert/ncas/alerts/aa22-055a - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
POWRUNER
Internal MISP references
UUID 63f6df51-4de3-495a-864f-0a7e30c3b419
which can be used as unique global reference for POWRUNER
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/ps1.powruner - webarchive
- https://www.boozallen.com/s/insight/blog/dark-labs-discovers-apt34-malware-variants.html?cid=spo-csatb-2 - webarchive
- https://cyware.com/blog/apt34-the-helix-kitten-cybercriminal-group-loves-to-meow-middle-eastern-and-international-organizations-48ae - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
PresFox
The family is adding a fake root certificate authority, sets a proxy.pac-url for local browsers and redirects infected users to fake banking applications (currently targeting Poland). Based on information shared, it seems the PowerShell script is dropped by an exploit kit.
Internal MISP references
UUID c8c5ca3c-7cf0-453e-9fe9-d5637b1ab1f8
which can be used as unique global reference for PresFox
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
QUADAGENT
Internal MISP references
UUID e27bfd65-4a58-416a-b03a-1ab1703edb24
which can be used as unique global reference for QUADAGENT
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/ps1.quadagent - webarchive
- https://docs.google.com/document/d/1oYX3uN6KxIX_StzTH0s0yFNNoHDnV8VgmVqU5WoeErc/edit#heading=h.ez428aw98bca - webarchive
- https://cyware.com/blog/apt34-the-helix-kitten-cybercriminal-group-loves-to-meow-middle-eastern-and-international-organizations-48ae - webarchive
- https://unit42.paloaltonetworks.com/dns-tunneling-in-the-wild-overview-of-oilrigs-dns-tunneling/ - webarchive
- https://www.fireeye.com/blog/threat-research/2020/07/scandalous-external-detection-using-network-scan-data-and-automation.html - webarchive
- https://youtu.be/pBDu8EGWRC4?t=2492 - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
RandomQuery (Powershell)
A set of powershell scripts, using services like Google Docs and Dropbox as C2.
Internal MISP references
UUID b0a67107-dff2-4fb9-a47e-10f83779bdbb
which can be used as unique global reference for RandomQuery (Powershell)
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
RMOT
According to Trellix, this is a first-stage, powershell-based malware dropped via Excel/VBS. It is able to establish a foothold and exfiltrate data. Targets identified include hotels in Macao.
Internal MISP references
UUID 7e79444b-95d9-422d-92f0-aeb833a7cbcd
which can be used as unique global reference for RMOT
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
RogueRobin
Internal MISP references
UUID 1e27a569-1899-4f6f-8c42-aa91bf0a539d
which can be used as unique global reference for RogueRobin
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/ps1.roguerobin - webarchive
- https://researchcenter.paloaltonetworks.com/2018/07/unit42-new-threat-actor-group-darkhydrus-targets-middle-east-government/ - webarchive
- https://docs.google.com/document/d/1oYX3uN6KxIX_StzTH0s0yFNNoHDnV8VgmVqU5WoeErc/edit#heading=h.ez428aw98bca - webarchive
- https://ironnet.com/blog/dns-tunneling-series-part-3-the-siren-song-of-roguerobin/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Royal Ransom (Powershell)
Toolkit downloader used by Royal Ransomware group, involving GnuPG for decryption.
Internal MISP references
UUID 1c75ffff-59f9-4fdc-958d-51f822f76c35
which can be used as unique global reference for Royal Ransom (Powershell)
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Schtasks
Internal MISP references
UUID 3c627182-e4ee-4db0-9263-9d657a5d7c98
which can be used as unique global reference for Schtasks
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
skyrat
Internal MISP references
UUID 8e5d7d24-9cdd-4376-a6c7-967273dfeeab
which can be used as unique global reference for skyrat
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
sLoad
sLoad is a PowerShell downloader that most frequently delivers Ramnit banker and includes noteworthy reconnaissance features. The malware gathers information about the infected system including a list of running processes, the presence of Outlook, and the presence of Citrix-related files. sLoad can also take screenshots and check the DNS cache for specific domains (e.g., targeted banks), as well as load external binaries.
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular sLoad.
Known Synonyms |
---|
Starslord |
Internal MISP references
UUID e78c0259-9299-4e55-b934-17c6a3ac4bc2
which can be used as unique global reference for sLoad
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/ps1.sload - webarchive
- https://cyware.com/news/new-sload-malware-downloader-being-leveraged-by-apt-group-ta554-to-spread-ramnit-7d03f2d9 - webarchive
- https://www.vkremez.com/2018/08/lets-learn-in-depth-into-latest-ramnit.html - webarchive
- https://www.microsoft.com/security/blog/2020/01/21/sload-launches-version-2-0-starslord/ - webarchive
- https://blog.yoroi.company/research/the-sload-powershell-threat-is-expanding-to-italy/ - webarchive
- https://blog.minerva-labs.com/sload-targeting-europe-again - webarchive
- https://threatpost.com/sload-spying-payload-delivery-bits/151120/ - webarchive
- https://www.certego.net/en/news/sload-hits-italy-unveil-the-power-of-powershell-as-a-downloader/ - webarchive
- https://www.proofpoint.com/us/threat-insight/post/sload-and-ramnit-pairing-sustained-campaigns-against-uk-and-italy - webarchive
- https://www.cert-pa.it/notizie/campagna-sload-star-wars-edition-veicolata-via-pec/ - webarchive
- https://isc.sans.edu/forums/diary/Malicious+Powershell+Targeting+UK+Bank+Customers/23675/ - webarchive
- https://cert-agid.gov.it/news/campagna-sload-v-2-9-3-veicolata-via-pec/ - webarchive
- https://www.cybereason.com/blog/banking-trojan-delivered-by-lolbins-ramnit-trojan - webarchive
- https://www.bitdefender.com/files/News/CaseStudies/study/377/Bitdefender-Whitepaper-WMI-creat4871-en-EN-GenericUse.pdf - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Snugy
Internal MISP references
UUID 773a6520-d164-4727-8351-c4201b04f10b
which can be used as unique global reference for Snugy
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
STEELHOOK
Internal MISP references
UUID f963e3df-13d1-4fd0-abdd-792c0d05e41c
which can be used as unique global reference for STEELHOOK
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
SUBTLE-PAWS
Internal MISP references
UUID 399258d3-6919-45f9-a557-10c3cbef9bd4
which can be used as unique global reference for SUBTLE-PAWS
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Swrort Stager
Internal MISP references
UUID 3347a1bc-6b4d-459c-98a5-746bab12d011
which can be used as unique global reference for Swrort Stager
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Tater PrivEsc
Internal MISP references
UUID 808445e6-f51c-4b5d-a812-78102bf60d24
which can be used as unique global reference for Tater PrivEsc
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
ThunderShell
Internal MISP references
UUID fd9904a6-6e06-4b50-8bfd-64ffb793d4a4
which can be used as unique global reference for ThunderShell
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Unidentified PS 001
Recon and exfiltration script, dropped from a LNK file. Attributed to APT-C-12.
Internal MISP references
UUID 77231587-0dbe-4064-97b5-d7f4a2e3dc67
which can be used as unique global reference for Unidentified PS 001
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Unidentified PS 002 (RAT)
A Powershell-based RAT capable of pulling further payloads, delivered through Russia-themed phishing mails.
Internal MISP references
UUID 73578ff6-b218-4271-9bda-2a567ba3e259
which can be used as unique global reference for Unidentified PS 002 (RAT)
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/ps1.unidentified_002 - webarchive
- https://www.bleepingcomputer.com/news/security/phishing-campaign-targets-russian-govt-dissidents-with-cobalt-strike/ - webarchive
- https://blog.malwarebytes.com/threat-intelligence/2022/03/new-spear-phishing-campaign-targets-russian-dissidents/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Unidentified PS 003 (RAT)
This malware is a RAT written in PowerShell. It has the following capabilities: Downloading and Uploading files, loading and execution of a PowerShell script, execution of a specific command. It was observed by Malwarebytes LABS Threat Intelligence Team in a newly discovered campaign: this campaigns tries to lure Germans with a promise of updates on the current threat situation in Ukraine according to Malwarebyte LABS.
Internal MISP references
UUID 709ba4ad-9ec5-4e0b-b642-96db3b7f6898
which can be used as unique global reference for Unidentified PS 003 (RAT)
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Unidentified PS 004 (RAT)
Internal MISP references
UUID a8f69576-676f-4536-b301-246ddd87ceeb
which can be used as unique global reference for Unidentified PS 004 (RAT)
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
ViperSoftX
Internal MISP references
UUID 15b551ea-b59a-40f9-a10f-6144415d2d5c
which can be used as unique global reference for ViperSoftX
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/ps1.vipersoftx - webarchive
- https://decoded.avast.io/janrubin/vipersoftx-hiding-in-system-logs-and-spreading-venomsoftx/ - webarchive
- https://chris.partridge.tech/2022/evolution-of-vipersoftx-dga - webarchive
- https://www.trendmicro.com/en_us/research/23/d/vipersoftx-updates-encryption-steals-data.html - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
WannaMine
Internal MISP references
UUID beb4f2b3-85d1-491d-8ae1-f7933f00f820
which can be used as unique global reference for WannaMine
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/ps1.wannamine - webarchive
- https://www.cybereason.com/blog/wannamine-cryptominer-eternalblue-wannacry - webarchive
- https://nakedsecurity.sophos.com/2018/01/31/what-are-wannamine-attacks-and-how-do-i-avoid-them/ - webarchive
- https://www.accenture.com/_acnmedia/PDF-46/Accenture-Threat-Analysis-Monero-Wannamine.pdf - webarchive
- https://www.crowdstrike.com/blog/cryptomining-harmless-nuisance-disruptive-threat/ - webarchive
- https://news.sophos.com/fr-fr/2020/01/22/wannamine-meme-cybercriminels-veulent-avoir-mot-a-dire-sur-brexit/ - webarchive
- https://www.crowdstrike.com/blog/weeding-out-wannamine-v4-0-analyzing-and-remediating-this-mineware-nightmare/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
WannaRen Downloader
Internal MISP references
UUID c9ef106e-def9-4229-8373-616a298ed645
which can be used as unique global reference for WannaRen Downloader
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
WMImplant
Internal MISP references
UUID d1150a1a-a2f4-4954-b22a-a85b7876408e
which can be used as unique global reference for WMImplant
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
AndroxGh0st
According to Laceworks, this is a SMTP cracker, which is primarily intended to scan for and parse Laravel application secrets from exposed .env files. Note: Laravel is an open source PHP framework and the Laravel .env file is often targeted for its various configuration data including AWS, SendGrid and Twilio. AndroxGh0st has multiple features to enable SMTP abuse including scanning, exploitation of exposed creds and APIs, and even deployment of webshells. For AWS specifically, the malware scans for and parses AWS keys but also has the ability to generate keys for brute force attacks. However, the brute force capability is likely a novelty and is a statistically unlikely attack vector.
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular AndroxGh0st.
Known Synonyms |
---|
Androx |
AndroxGhost |
Internal MISP references
UUID e8f24c9c-c03c-4740-a121-d73789931c8e
which can be used as unique global reference for AndroxGh0st
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Archivist
Internal MISP references
UUID 2095a09c-3fdd-4164-b82e-2e9a41affd8e
which can be used as unique global reference for Archivist
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Ares (Python)
Ares is a Python RAT.
Internal MISP references
UUID c4a578de-bebe-49bf-8af1-407857acca95
which can be used as unique global reference for Ares (Python)
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
BlankGrabber
Stealer written in Python 3, typically distributed bundled via PyInstaller.
Internal MISP references
UUID c41d4749-b713-4f4c-b718-4076c0479ebc
which can be used as unique global reference for BlankGrabber
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
BrickerBot
Internal MISP references
UUID f0ff8751-c182-4e9c-a275-81bb03e0cdf5
which can be used as unique global reference for BrickerBot
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/py.brickerbot - webarchive
- https://www.bleepingcomputer.com/news/security/brickerbot-author-claims-he-bricked-two-million-devices/ - webarchive
- https://ics-cert.us-cert.gov/alerts/ICS-ALERT-17-102-01A - webarchive
- http://seclists.org/fulldisclosure/2017/Mar/7 - webarchive
- https://security.radware.com/ddos-threats-attacks/brickerbot-pdos-permanent-denial-of-service/ - webarchive
- https://www.bleepingcomputer.com/news/security/brickerbot-author-retires-claiming-to-have-bricked-over-10-million-iot-devices/ - webarchive
- http://depastedihrn3jtw.onion/show.php?md5=2c822a990ff22d56f3b9eb89ed722c3f - webarchive
- https://www.trustwave.com/Resources/SpiderLabs-Blog/BrickerBot-mod_plaintext-Analysis/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Creal Stealer
Stealer written in Python.
Internal MISP references
UUID 8a7becae-fc06-4ff1-b364-b26dd3d2edd9
which can be used as unique global reference for Creal Stealer
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
DropboxC2C
Internal MISP references
UUID 53dd4a8b-374e-48b6-a7c8-58af0e31f435
which can be used as unique global reference for DropboxC2C
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Empyrean
Discord Stealer written in Python with Javascript-based inject files.
Internal MISP references
UUID b1aa0be3-b725-4135-b0b9-3a895d4ef047
which can be used as unique global reference for Empyrean
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Evil Ant
Ransomware written in Python.
Internal MISP references
UUID 24d570c6-3ed4-4346-a8b1-9fed2ed67a95
which can be used as unique global reference for Evil Ant
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Guard
According to Kaspersky Labs, Guard is a malware developed by threat actor WildPressure. It is written in Python and packaged using PyInstaller, both for Windows and macOS operating systems. Its intrinsics resemble parts of how win.milum operates.
Internal MISP references
UUID ac3382b3-3c18-4b16-8f1b-b371794916ac
which can be used as unique global reference for Guard
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
InvisibleFerret
Internal MISP references
UUID 332478a1-146f-406e-9af0-b329e478efff
which can be used as unique global reference for InvisibleFerret
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/py.invisibleferret - webarchive
- https://security.macnica.co.jp/blog/2024/10/-contagious-interview.html - webarchive
- https://stacklok.com/blog/dependency-hijacking-dissecting-north-koreas-new-wave-of-defi-themed-open-source-attacks-targeting-developers - webarchive
- https://unit42.paloaltonetworks.com/two-campaigns-by-north-korea-bad-actors-target-job-hunters/ - webarchive
- https://www.zscaler.com/blogs/security-research/pyongyang-your-payroll-rise-north-korean-remote-workers-west - webarchive
- https://securitylabs.datadoghq.com/articles/tenacious-pungsan-dprk-threat-actor-contagious-interview/ - webarchive
- https://securityscorecard.com/blog/the-job-offer-that-wasnt-how-we-stopped-an-espionage-plot - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
KeyPlexer
Internal MISP references
UUID cadf8c9d-7bb0-40ad-8c8c-043b1d4b2e93
which can be used as unique global reference for KeyPlexer
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
LaZagne
The author described LaZagne as an open source project used to retrieve lots of passwords stored on a local computer. It has been developed for the purpose of finding these passwords for the most commonly-used software. It is written in Python and provided as compiled standalone binaries for Linux, Mac, and Windows.
Internal MISP references
UUID c752f295-7f08-4cb0-92d5-a0c562abd08c
which can be used as unique global reference for LaZagne
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/py.lazagne - webarchive
- https://www.mandiant.com/resources/blog/alphv-ransomware-backup - webarchive
- https://decoded.avast.io/luigicamastra/apt-group-targeting-governmental-agencies-in-east-asia/?utm_source=rss&utm_medium=rss&utm_campaign=apt-group-targeting-governmental-agencies-in-east-asia - webarchive
- https://www.infinitumit.com.tr/apt-35/ - webarchive
- https://www.trendmicro.com/vinfo/us/security/news/ransomware-spotlight/ransomware-spotlight-ransomexx - webarchive
- https://marcoramilli.com/2021/01/09/c2-traffic-patterns-personal-notes/ - webarchive
- https://edu.anarcho-copy.org/Against%20Security%20&%20%20Self%20Security/Group-IB%20RedCurl.pdf - webarchive
- https://attack.mitre.org/groups/G0100/ - webarchive
- https://yoroi.company/research/shadows-from-the-past-threaten-italian-enterprises/ - webarchive
- https://attack.mitre.org/groups/G0100 - webarchive
- https://thedfirreport.com/2022/05/09/seo-poisoning-a-gootloader-story/ - webarchive
- https://fourcore.io/blogs/threat-hunting-browser-credential-stealing - webarchive
- https://securelist.com/defttorero-tactics-techniques-and-procedures/107610/ - webarchive
- https://github.com/AlessandroZ/LaZagne - webarchive
- https://www.trendmicro.com/en_us/research/20/k/weaponizing-open-source-software-for-targeted-attacks.html - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Lofy
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Lofy.
Known Synonyms |
---|
LofyLife |
Internal MISP references
UUID 10882613-ac61-42da-82c8-c0f4bb2673f8
which can be used as unique global reference for Lofy
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Loki RAT
This RAT written in Python is an open-source fork of the Ares RAT. This malware integrates additional modules, like recording, lockscreen, and locate options. It was used in a customized form version by El Machete APT in an ongoing champaign since 2020. The original code can be found at: https://github.com/TheGeekHT/Loki.Rat/
Internal MISP references
UUID 5e7bb9d4-6633-49f8-8770-9ac1163e6531
which can be used as unique global reference for Loki RAT
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
MASEPIE
Internal MISP references
UUID 9233f6e6-9dd7-4b30-adaa-5baf5359d22a
which can be used as unique global reference for MASEPIE
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/py.masepie - webarchive
- https://thehackernews.com/2024/03/apt28-hacker-group-targeting-europe.html?m=1 - webarchive
- https://harfanglab.io/en/insidethelab/compromised-routers-infrastructure-target-europe-caucasus/ - webarchive
- https://cert.gov.ua/article/6276894 - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
N3Cr0m0rPh
An IRC bot written in (obfuscated) Python code. Distributed in attack campaign FreakOut, written by author Freak/Fl0urite and development potentially dating back as far as 2015.
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular N3Cr0m0rPh.
Known Synonyms |
---|
FreakOut |
Necro |
Internal MISP references
UUID 2351539a-165a-4886-b5fe-f56fdf6b167a
which can be used as unique global reference for N3Cr0m0rPh
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/py.n3cr0m0rph - webarchive
- https://blog.netlab.360.com/not-really-new-pyhton-ddos-bot-n3cr0m0rph-necromorph/ - webarchive
- https://blogs.juniper.net/en-us/threat-research/necro-python-botnet-goes-after-vulnerable-visualtools-dvr - webarchive
- https://research.checkpoint.com/2021/freakout-leveraging-newest-vulnerabilities-for-creating-a-botnet/ - webarchive
- https://www.bleepingcomputer.com/news/security/freakout-malware-worms-its-way-into-vulnerable-vmware-servers/ - webarchive
- https://blog.talosintelligence.com/2021/06/necro-python-bot-adds-new-tricks.html - webarchive
- https://blog.netlab.360.com/necro-upgrades-again-using-tor-dynamic-domain-dga-and-aiming-at-both-windows-linux/ - webarchive
- https://www.lacework.com/keksec-tsunami-ryuk/ - webarchive
- https://blog.netlab.360.com/necro/ - webarchive
- https://github.com/lacework/lacework-labs/tree/master/keksec - webarchive
- https://twitter.com/xuy1202/status/1393384128456794116 - webarchive
- https://www.lacework.com/blog/the-kek-security-network/ - webarchive
- https://www.lacework.com/blog/spytech-necro-keksecs-latest-python-malware/ - webarchive
- https://blog.netlab.360.com/gafgtyt_tor-and-necro-are-on-the-move-again/ - webarchive
- https://www.lacework.com/the-kek-security-network/ - webarchive
- https://twitter.com/xuy1202/status/1392089568384454657 - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
NetWorm
Internal MISP references
UUID 6c6acd00-cdc2-460d-8edf-003b84875b5d
which can be used as unique global reference for NetWorm
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
PIRAT
Internal MISP references
UUID bca94d33-e5a1-4bcc-981e-f35fd74a79d1
which can be used as unique global reference for PIRAT
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Poet RAT
Cisco Talos has discovered a Python-based RAT they call Poet RAT. It is dropped from a Word document and delivered including a Python interpreter and required libraries. The name originates from references to Shakespeare. Exfiltration happens through FTP.
Internal MISP references
UUID b07819a9-a2f7-454d-a520-c6424cbf1ed4
which can be used as unique global reference for Poet RAT
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/py.poet_rat - webarchive
- https://ics-cert.kaspersky.com/media/KASPERSKY_H1_2020_ICS_REPORT_EN.pdf - webarchive
- https://www.dragos.com/blog/industry-news/new-ics-threat-activity-group-stibnite/ - webarchive
- https://www.ptsecurity.com/ww-en/analytics/antisandbox-techniques/ - webarchive
- https://blog.talosintelligence.com/yorotrooper-espionage-campaign-cis-turkey-europe/ - webarchive
- https://blog.talosintelligence.com/2020/04/poetrat-covid-19-lures.html - webarchive
- https://www.cyborgsecurity.com/cyborg_labs/python-malware-on-the-rise/ - webarchive
- https://blog.talosintelligence.com/2020/10/poetrat-update.html - webarchive
- https://blog.talosintelligence.com/2020/12/2020-year-in-malware.html - webarchive
- https://securelist.com/apt-trends-report-q3-2020/99204/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
poweRAT
Internal MISP references
UUID b5cb3d2b-0205-4883-aaff-0d0b7a7f032d
which can be used as unique global reference for poweRAT
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
pupy (Python)
Internal MISP references
UUID afcc9bfc-1227-4bb0-a88a-5accdbfd58fa
which can be used as unique global reference for pupy (Python)
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/py.pupy - webarchive
- https://go.recordedfuture.com/hubfs/reports/cta-2020-0123.pdf - webarchive
- https://go.recordedfuture.com/hubfs/reports/cta-2021-0107.pdf - webarchive
- https://www.secureworks.com/research/threat-profiles/cobalt-trinity - webarchive
- https://www.secureworks.com/research/threat-profiles/cobalt-gypsy - webarchive
- https://github.com/n1nj4sec/pupy - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
PyAesLoader
Internal MISP references
UUID b9ba4f66-78dc-491f-8fd4-0143816ce80e
which can be used as unique global reference for PyAesLoader
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
PyArk
Internal MISP references
UUID 01f15f4e-dd40-4246-9b99-c0d81306e37f
which can be used as unique global reference for PyArk
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
pyback
Internal MISP references
UUID 6d96cd1e-98f4-4784-9982-397c5df19bd9
which can be used as unique global reference for pyback
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
PY#RATION
According to Securonix, this malware exhibits remote access trojan (RAT) behavior, allowing for control of and persistence on the affected host. As with other RATs, PY#RATION possesses a whole host of features and capabilities, including data exfiltration and keylogging. What makes this malware particularly unique is its utilization of websockets for both command and control (C2) communication and exfiltration as well as how it evades detection from antivirus and network security measures.
Internal MISP references
UUID 1dc471d3-6303-48a1-a17a-b4f29e5ba6a9
which can be used as unique global reference for PY#RATION
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
PyVil
PyVil RAT
Internal MISP references
UUID 2cf75f3c-116f-4faf-bd32-ba3a5e2327cf
which can be used as unique global reference for PyVil
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
QUIETBOARD
Internal MISP references
UUID 6ebeed34-4a7d-44d8-ae44-83ae37cf5f2f
which can be used as unique global reference for QUIETBOARD
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Responder
Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv2/LMv2, Extended Security NTLMSSP and Basic HTTP authentication.
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Responder.
Known Synonyms |
---|
SpiderLabs Responder |
Internal MISP references
UUID 3271b5ca-c044-4ab8-bbfc-0d6e1a6601fc
which can be used as unique global reference for Responder
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Saphyra
Internal MISP references
UUID 30a22cdb-9393-460b-86ae-08d97c626155
which can be used as unique global reference for Saphyra
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Serpent
According to Proofpoint, this is a backdoor written in Python, used in attacks against French entities in the construction, real estate, and government industries.
Internal MISP references
UUID 8052319b-f6da-4f53-a630-59245ff65eaf
which can be used as unique global reference for Serpent
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/py.serpent - webarchive
- https://www.proofpoint.com/us/blog/threat-insight/serpent-no-swiping-new-backdoor-targets-french-entities-unique-attack-chain - webarchive
- https://www.bleepingcomputer.com/news/security/serpent-malware-campaign-abuses-chocolatey-windows-package-manager/ - webarchive
- https://blogs.vmware.com/security/2022/04/serpent-the-backdoor-that-hides-in-plain-sight.html - webarchive
- https://labs.k7computing.com/index.php/uncovering-the-serpent/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
SpaceCow
Internal MISP references
UUID ff5c0845-6740-45d5-bd34-1cf69c635356
which can be used as unique global reference for SpaceCow
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
stealler
Internal MISP references
UUID 689247a2-4e75-4802-ab94-484fc3d6a18e
which can be used as unique global reference for stealler
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Stitch
Internal MISP references
UUID 6239201b-a0bd-4f01-8bbe-79c6fc5fa861
which can be used as unique global reference for Stitch
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Stormous
Internal MISP references
UUID e2580f5e-417b-4f21-88ba-8d3e43514363
which can be used as unique global reference for Stormous
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
unidentified_002
Internal MISP references
UUID 7e5fe6ca-3323-409a-a5bb-d34f60197b99
which can be used as unique global reference for unidentified_002
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
unidentified_003
Internal MISP references
UUID 43282411-4999-4066-9b99-2e94a17acbd4
which can be used as unique global reference for unidentified_003
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
UPSTYLE
Internal MISP references
UUID 1824c463-77df-43af-a055-d94567918f6b
which can be used as unique global reference for UPSTYLE
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Venomous
Ransomware written in Python and delivered as compiled executable created using PyInstaller.
Internal MISP references
UUID 0bd5aed2-9c74-41a5-9fcf-9379f2cb0e2c
which can be used as unique global reference for Venomous
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Venus Stealer
Venus Stealer is a python based Infostealer observed early 2023.
Internal MISP references
UUID 20f72d3c-87b7-4349-ad1b-59d7909c1df4
which can be used as unique global reference for Venus Stealer
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
VileRAT
Internal MISP references
UUID aba54ca9-ef0d-4061-93d1-65251e90afad
which can be used as unique global reference for VileRAT
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
W4SP Stealer
A basic info stealer w/ some capability to inject code into legit applications.
Internal MISP references
UUID c4d46e47-3af8-4117-84ad-1e5699956f2b
which can be used as unique global reference for W4SP Stealer
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
WIREFIRE
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular WIREFIRE.
Known Synonyms |
---|
GIFTEDVISITOR |
Internal MISP references
UUID 54f3e853-5f0e-4940-9e27-79e6991886f9
which can be used as unique global reference for WIREFIRE
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
KV
Internal MISP references
UUID 37784130-81fd-40d7-87d4-38e5085513bd
which can be used as unique global reference for KV
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/sh.kv - webarchive
- https://blog.lumen.com/routers-roasting-on-an-open-firewall-the-kv-botnet-investigation/ - webarchive
- https://www.securityweek.com/wp-content/uploads/2024/01/Volt-Typhoon.pdf - webarchive
- https://blog.lumen.com/kv-botnet-dont-call-it-a-comeback/ - webarchive
- https://www.justice.gov/opa/pr/us-government-disrupts-botnet-peoples-republic-china-used-conceal-hacking-critical - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
xzbot
A backdoor brought into version 5.6.0 and 5.6.1 of compression library/tool xz/liblzma, which was intended to enable access via (Open)SSH on affected servers.
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular xzbot.
Known Synonyms |
---|
xzorcist |
Internal MISP references
UUID 293b9d76-8e58-48bc-936b-e8dfb00f6f6c
which can be used as unique global reference for xzbot
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/sh.xzbot - webarchive
- https://www.wired.com/story/jia-tan-xz-backdoor/ - webarchive
- https://github.com/amlweems/xzbot - webarchive
- https://gynvael.coldwind.pl/?lang=en&id=782 - webarchive
- https://www.openwall.com/lists/oss-security/2024/03/29/4 - webarchive
- https://twitter.com/fr0gger_/status/1774342248437813525 - webarchive
- https://medium.com/@DCSO_CyTec/xz-backdoor-how-to-check-if-your-systems-are-affected-fb169b638271 - webarchive
- https://gist.github.com/thesamesam/223949d5a074ebc3dce9ee78baad9e27 - webarchive
- https://www.linkedin.com/posts/threatmon_xz-utils-backdoor-cve-2024-3094-activity-7181228442791641088-rw2a?utm_source=share&utm_medium=member_desktop - webarchive
- https://www.sentinelone.com/blog/xz-utils-backdoor-threat-actor-planned-to-inject-further-vulnerabilities/ - webarchive
- https://www.cisa.gov/news-events/alerts/2024/03/29/reported-supply-chain-compromise-affecting-xz-utils-data-compression-library-cve-2024-3094 - webarchive
- https://boehs.org/node/everything-i-know-about-the-xz-backdoor - webarchive
- https://gist.github.com/smx-smx/a6112d54777845d389bd7126d6e9f504 - webarchive
- https://github.com/karcherm/xz-malware - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
FlexiSpy (symbian)
Internal MISP references
UUID 9f85f4fc-1cce-4557-b3d8-b9ef522fafb2
which can be used as unique global reference for FlexiSpy (symbian)
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
BASICSTAR
Internal MISP references
UUID ca86807d-5466-496a-b41f-4bde905f9064
which can be used as unique global reference for BASICSTAR
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
CageyChameleon
CageyChameleon Malware is a VBS-based backdoor which has the capability to enumerate the list of running processes and check for the presence of several antivirus products. CageyChameleon will collect user host information, system current process information, etc. The collected information is sent back to the C2 server, and continue to initiate requests to perform subsequent operations.
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular CageyChameleon.
Known Synonyms |
---|
Cabbage RAT |
Internal MISP references
UUID ea71b7c1-79eb-4e9c-a670-ea75d80132f4
which can be used as unique global reference for CageyChameleon
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/vbs.cageychameleon - webarchive
- https://mp.weixin.qq.com/s/nnLqUBPX8xZ3hCr5u-iSjQ - webarchive
- https://atlas-cybersecurity.com/cyber-threats/cryptocore-cryptocurrency-exchanges-under-attack/ - webarchive
- https://sansorg.egnyte.com/dl/3P3HxFiNgL - webarchive
- https://threatbook.cn/ppt/The%2520Nightmare%2520of%2520Global%2520Cryptocurrency%2520Companies%2520-%2520Demystifying%2520the%2520%25E2%2580%259CDangerousPassword%25E2%2580%259D%2520of%2520the%2520APT%2520Organization.pdf - webarchive
- https://cyberstruggle.org/delta/LeeryTurtleThreatReport_05_20.pdf - webarchive
- https://vb2020.vblocalhost.com/conference/presentations/unveiling-the-cryptomimic/ - webarchive
- https://blogs.jpcert.or.jp/en/2019/07/spear-phishing-against-cryptocurrency-businesses.html - webarchive
- https://www.clearskysec.com/wp-content/uploads/2021/05/CryptoCore-Lazarus-Clearsky.pdf - webarchive
- https://www.clearskysec.com/wp-content/uploads/2020/06/CryptoCore_Group.pdf - webarchive
- https://www.proofpoint.com/us/blog/threat-insight/ta444-apt-startup-aimed-at-your-funds - webarchive
- https://www.proofpoint.com/us/daily-ruleset-update-summary-20190314 - webarchive
- https://blogs.jpcert.or.jp/ja/2023/05/dangerouspassword.html - webarchive
- https://www.clearskysec.com/cryptocore-group/ - webarchive
- https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=&ved=2ahUKEwjCk7uOzMP-AhXOYMAKHYtLCKkQFnoECBIQAQ&url=https%3A%2F%2Fi.blackhat.com%2FUSA-22%2FThursday%2FUS-22-Wikoff-Talent-Need-Not-Apply.pdf&usg=AOvVaw0deqd7ozZyRTfSBOBmlbiG - webarchive
- https://securelist.com/the-bluenoroff-cryptocurrency-hunt-is-still-on/105488/ - webarchive
- https://github.com/StrangerealIntel/CyberThreatIntel/blob/master/offshore%20APT%20organization/DangerousPassword/2020-04-02/Analysis.md - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
forbiks
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular forbiks.
Known Synonyms |
---|
Forbix |
Internal MISP references
UUID 2ad12163-3a8e-4ece-969e-ac616303ebe1
which can be used as unique global reference for forbiks
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
GGLdr
Internal MISP references
UUID 8ca31b9b-6e78-4dcc-9d14-dfd97d44994e
which can be used as unique global reference for GGLdr
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
GlowSpark
Internal MISP references
UUID ab6f8b6d-f0a0-4d2c-a81b-2dcb146914ea
which can be used as unique global reference for GlowSpark
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Grinju Downloader
Internal MISP references
UUID f0a64323-62a6-4c5a-bb3d-44bd3b11507f
which can be used as unique global reference for Grinju Downloader
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
HALFBAKED
The HALFBAKED malware family consists of multiple components designed to establish and maintain a foothold in victim networks, with the ultimate goal of gaining access to sensitive financial information. HALFBAKED listens for the following commands from the C2 server:
info: Sends victim machine information (OS, Processor, BIOS and running processes) using WMI queries processList: Send list of process running screenshot: Takes screen shot of victim machine (using 58d2a83f777688.78384945.ps1) runvbs: Executes a VB script runexe: Executes EXE file runps1: Executes PowerShell script delete: Delete the specified file update: Update the specified file
Internal MISP references
UUID 095c995c-c916-488e-944d-a3f4b9842926
which can be used as unique global reference for HALFBAKED
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/vbs.halfbaked - webarchive
- https://www.fireeye.com/blog/threat-research/2017/04/fin7-phishing-lnk.html - webarchive
- https://attack.mitre.org/software/S0151/ - webarchive
- https://summit.fireeye.com/content/dam/fireeye-www/summit/cds-2018/presentations/cds18-technical-s05-att&cking-fin7.pdf - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
HOMESTEEL
Internal MISP references
UUID 9058df01-6f7c-447e-9a68-83a41ef2f15f
which can be used as unique global reference for HOMESTEEL
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Iloveyou
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Iloveyou.
Known Synonyms |
---|
Love Bug |
LoveLetter |
Internal MISP references
UUID bba3f3c9-f65f-45f1-a482-7209b9fa5adb
which can be used as unique global reference for Iloveyou
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Janicab (VBScript)
Internal MISP references
UUID b3cb5859-2049-43d3-aed2-73db45ed0112
which can be used as unique global reference for Janicab (VBScript)
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
lampion
Malware is delivered by emails, containing links to ZIP files or ZIP attachments. The ZIP contains a VBscript that, when executed, downloads additional files from AWS S3, Google Drive or other cloud hosting services. The downloaded files are encrypted .exe and .dll files. The malware targets banking clients in Portugal.
Internal MISP references
UUID 97f89048-2a57-48d5-9272-0d1061a14eca
which can be used as unique global reference for lampion
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/vbs.lampion - webarchive
- https://research.checkpoint.com/wp-content/uploads/2019/12/Threat_Intelligence_News_2019-12-30.pdf - webarchive
- https://seguranca-informatica.pt/targeting-portugal-a-new-trojan-lampion-has-spread-using-template-emails-from-the-portuguese-government-finance-tax/ - webarchive
- https://seguranca-informatica.pt/trojan-lampion-is-back-after-3-months/ - webarchive
- https://unit42.paloaltonetworks.com/single-bit-trap-flag-intel-cpu/ - webarchive
- https://securityaffairs.co/wordpress/128975/malware/hidden-c2-lampion-trojan-release-212.html - webarchive
- https://seguranca-informatica.pt/lampion-trojan-disseminated-in-portugal-using-covid-19-template/ - webarchive
- https://www.layer8.pt/PDFs/New%20Lampion%20banking%20Trojan%20variant%20in%20the%20wild.pdf - webarchive
- https://cofense.com/blog/lampion-trojan-utilizes-new-delivery-through-cloud-based-sharing - webarchive
- https://seguranca-informatica.pt/the-hidden-c2-lampion-trojan-release-212-is-on-the-rise-and-using-a-c2-server-for-two-years - webarchive
- https://seguranca-informatica.pt/new-release-of-lampion-trojan-spreads-in-portugal-with-some-improvements-on-the-vbs-downloader - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
LitterDrifter
Internal MISP references
UUID 31f64da5-e20b-4aa8-acf6-029bca10a7e6
which can be used as unique global reference for LitterDrifter
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
lockscreen
Internal MISP references
UUID a583a2db-616e-48e5-b12b-088a378c2307
which can be used as unique global reference for lockscreen
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
MOUSEISLAND
MOUSEISLAND is a Microsoft Word macro downloader used as the first infection stage and is delivered inside a password-protected zip attached to a phishing email. Based on Fireeye intrusion data from responding to ICEDID related incidents, the secondary payload delivered by MOUSEISLAND has been PHOTOLOADER, which acts as an intermediary downloader to install ICEDID.
Internal MISP references
UUID e9afcd80-c1c6-4194-af32-133fe31e835f
which can be used as unique global reference for MOUSEISLAND
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
NodeJS Ransomware
Downloads NodeJS when deployed.
Internal MISP references
UUID 93c87125-7150-4bc6-a0f9-b46ff8de1839
which can be used as unique global reference for NodeJS Ransomware
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
RandomQuery (VBScript)
According to SentinelLabs, this is a VisualBasic-based malware that gathers system and file information and exfiltrates the data using InternetExplorer.Application or Microsoft.XMLHTTP objects.
Internal MISP references
UUID 76fd3fcb-151d-4880-b97e-ea890c337aad
which can be used as unique global reference for RandomQuery (VBScript)
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Starfighter (VBScript)
According to the author, this is a JavaScript based Empire launcher that runs with its own embedded powershell host to not be dependent on local powershell availability.
Internal MISP references
UUID e24b852c-3ede-42ac-8d04-68ab96bf53a0
which can be used as unique global reference for Starfighter (VBScript)
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
STARWHALE
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular STARWHALE.
Known Synonyms |
---|
Canopy |
SloughRAT |
Internal MISP references
UUID 27c70673-d40e-46a2-8f47-13cc5738ff36
which can be used as unique global reference for STARWHALE
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/vbs.starwhale - webarchive
- https://thehackernews.com/2022/03/iranian-hackers-targeting-turkey-and.html - webarchive
- https://www.govinfosecurity.com/iranian-apt-new-methods-to-target-turkey-arabian-peninsula-a-18706 - webarchive
- https://thehackernews.com/2022/02/irans-muddywater-hacker-group-using-new.html - webarchive
- https://www.inforisktoday.com/muddywater-targets-critical-infrastructure-in-asia-europe-a-18611 - webarchive
- https://www.mandiant.com/resources/telegram-malware-iranian-espionage - webarchive
- https://www.techrepublic.com/article/muddywater-targets-middle-eastern-and-asian-countries-in-phishing-attacks/ - webarchive
- https://blog.talosintelligence.com/iranian-supergroup-muddywater/ - webarchive
- https://rootdaemon.com/2022/03/10/iranian-hackers-targeting-turkey-and-arabian-peninsula-in-new-malware-campaign/ - webarchive
- https://blog.talosintelligence.com/2022/03/iranian-supergroup-muddywater.html - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Unidentified VBS 001
Internal MISP references
UUID ba354d45-bc41-40cd-93b2-26139db296bd
which can be used as unique global reference for Unidentified VBS 001
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Unidentified 002 (Operation Kremlin)
Unnamed malware. Delivered as remote template that drops a VBS file, which uses LOLBINs to crawl the disk and exfiltrate data zipped up via winrar.
Internal MISP references
UUID d8e8d701-ebe4-44ab-8c5b-70a11246ddf1
which can be used as unique global reference for Unidentified 002 (Operation Kremlin)
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Unidentified 003 (Gamaredon Downloader)
Internal MISP references
UUID d5955c4b-f507-4b3f-8d57-080849aba831
which can be used as unique global reference for Unidentified 003 (Gamaredon Downloader)
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/vbs.unidentified_003 - webarchive
- https://aaqeel01.wordpress.com/2021/01/18/docx-files-template-injection/ - webarchive
- https://threatmon.io/beyond-bullets-and-bombs-an-examination-of-armageddon-groups-cyber-warfare-against-ukraine/ - webarchive
- https://www.threatstop.com/blog/gamaredon-group-understanding-the-russian-apt - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Unidentified VBS 004 (RAT)
Lab52 describes this as a light first-stage RAT used by MuddyWater and observed samples between at least November 2020 and January 2022.
Internal MISP references
UUID 84c6b483-ba17-4a22-809d-dc37d9ce1822
which can be used as unique global reference for Unidentified VBS 004 (RAT)
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Unidentified VBS 005 (Telegram Loader)
Internal MISP references
UUID 8eb8ebbc-c5b1-47d8-816a-4e21dee145c3
which can be used as unique global reference for Unidentified VBS 005 (Telegram Loader)
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Unidentified VBS 006 (Telegram Loader)
Internal MISP references
UUID a6bd28db-c1a3-44b1-8bc3-7882e2896d67
which can be used as unique global reference for Unidentified VBS 006 (Telegram Loader)
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/vbs.unidentified_006 - webarchive
- https://blogs.blackberry.com/en/2023/01/gamaredon-abuses-telegram-to-target-ukrainian-organizations - webarchive
- https://threatmon.io/beyond-bullets-and-bombs-an-examination-of-armageddon-groups-cyber-warfare-against-ukraine/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
VBREVSHELL
According to Mandiant, VBREVSHELL is a VBA macro that spawns a reverse shell relying exclusively on Windows API calls.
Internal MISP references
UUID 991179a0-efd5-450a-a1ce-78d1109bb50b
which can be used as unique global reference for VBREVSHELL
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
WasabiSeed
Internal MISP references
UUID 0c6568da-7017-4d9f-b077-0c486b3f9057
which can be used as unique global reference for WasabiSeed
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
WhiteShadow
Internal MISP references
UUID dc857b7d-f228-4aa5-9e89-f7e17bb7ea8c
which can be used as unique global reference for WhiteShadow
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
000Stealer
Internal MISP references
UUID 24e598cf-4c55-468a-ac1d-cc4f89104943
which can be used as unique global reference for 000Stealer
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
0bj3ctivityStealer
Information stealer, based on strings it seems to target crypto currencies, instant messengers, and browser data.
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular 0bj3ctivityStealer.
Known Synonyms |
---|
PXRECVOWEIWOEI |
Internal MISP references
UUID ac22ee6f-0d15-4edb-8ea5-1675df57597c
which can be used as unique global reference for 0bj3ctivityStealer
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
3CX Backdoor (Windows)
According to CrowdStrike, this backdoor was discovered being embedded in a legitimate, signed version of 3CXDesktopApp, and thus constitutes a supply chain attack.
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular 3CX Backdoor (Windows).
Known Synonyms |
---|
SUDDENICON |
Internal MISP references
UUID b6a00e25-9d8d-4ebc-b9fc-7fd41797303b
which can be used as unique global reference for 3CX Backdoor (Windows)
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/win.3cx_backdoor - webarchive
- https://www.fortinet.com/blog/threat-research/3cx-desktop-app-compromised - webarchive
- https://www.elastic.co/security-labs/elastic-users-protected-from-suddenicon-supply-chain-attack - webarchive
- https://www.splunk.com/en_us/blog/security/splunk-insights-investigating-the-3cxdesktopapp-supply-chain-compromise.html - webarchive
- https://www.zscaler.com/security-research/3CX-supply-chain-attack-analysis-march-2023 - webarchive
- https://github.com/dodo-sec/Malware-Analysis/blob/main/SmoothOperator/SmoothOperator.md - webarchive
- https://www.sentinelone.com/blog/smoothoperator-ongoing-campaign-trojanizes-3cx-software-in-software-supply-chain-attack/ - webarchive
- https://www.volexity.com/blog/2023/03/30/3cx-supply-chain-compromise-leads-to-iconic-incident/ - webarchive
- https://securelist.com/it-threat-evolution-q2-2023/110355/ - webarchive
- https://blogs.blackberry.com/en/2023/03/initial-implants-and-network-analysis-suggest-the-3cx-supply-chain-operation-goes-back-to-fall-2022 - webarchive
- https://www.reddit.com/r/crowdstrike/comments/125r3uu/20230329_situational_awareness_crowdstrike/ - webarchive
- https://www.group-ib.com/blog/3cx-supply-chain-attack/?utm_source=twitter&utm_campaign=3cx-blog&utm_medium=social - webarchive
- https://www.youtube.com/watch?v=fTX-vgSEfjk - webarchive
- https://www.virusbulletin.com/uploads/pdf/conference/vb2023/papers/Lazarus-campaigns-and-backdoors-in-2022-2023.pdf - webarchive
- https://www.huntress.com/blog/3cx-voip-software-compromise-supply-chain-threats - webarchive
- https://www.cadosecurity.com/forensic-triage-of-a-windows-system-running-the-backdoored-3cx-desktop-app/ - webarchive
- https://research.openanalysis.net/3cx/northkorea/apt/triage/2023/03/30/3cx-malware.html#Functionality - webarchive
- https://www.welivesecurity.com/2023/04/20/linux-malware-strengthens-links-lazarus-3cx-supply-chain-attack - webarchive
- https://blogs.vmware.com/security/2023/03/investigating-3cx-desktop-application-attacks-what-you-need-to-know.html - webarchive
- https://www.rapid7.com/blog/post/2023/03/30/backdoored-3cxdesktopapp-installer-used-in-active-threat-campaign/ - webarchive
- https://www.trendmicro.com/en_us/research/23/c/information-on-attacks-involving-3cx-desktop-app.html - webarchive
- https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/3cx-supply-chain-attack - webarchive
- https://blog.cyble.com/2023/03/31/a-comprehensive-analysis-of-the-3cx-attack - webarchive
- https://www.crowdstrike.com/blog/crowdstrike-detects-and-prevents-active-intrusion-campaign-targeting-3cxdesktopapp-customers/ - webarchive
- https://www.reversinglabs.com/blog/red-flags-fly-over-supply-chain-compromised-3cx-update - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
404 Keylogger
Snake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victim’s sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular 404 Keylogger.
Known Synonyms |
---|
404KeyLogger |
Snake Keylogger |
Internal MISP references
UUID 6b87fada-86b3-449d-826d-a89858121b68
which can be used as unique global reference for 404 Keylogger
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger - webarchive
- https://twitter.com/James_inthe_box/status/1401921257109561353 - webarchive
- https://insights.infoblox.com/threat-intelligence-reports/threat-intelligence--89 - webarchive
- https://www.fortinet.com/blog/threat-research/deep-dive-into-a-fresh-variant-of-snake-keylogger-malware - webarchive
- https://securityintelligence.com/x-force/spam-trends-campaigns-senior-superlatives-2023/ - webarchive
- https://any.run/cybersecurity-blog/analyzing-snake-keylogger/ - webarchive
- https://blog.nviso.eu/2022/04/06/analyzing-a-multilayer-maldoc-a-beginners-guide/ - webarchive
- https://x-junior.github.io/malware%20analysis/2022/06/24/Snakekeylogger.html - webarchive
- https://blog.netlab.360.com/purecrypter - webarchive
- https://securityintelligence.com/posts/roboski-global-recovery-automation/ - webarchive
- https://malwarebookreports.com/cross-platform-java-dropper-snake-and-xloader-mac-version/ - webarchive
- https://www.cybereason.com/blog/threat-analysis-report-snake-infostealer-malware - webarchive
- https://www.malwarebytes.com/blog/threat-intelligence/2022/20221121-threat-intel-report-final.pdf - webarchive
- https://www.bitsight.com/blog/exfiltration-over-telegram-bots-skidding-infostealer-logs - webarchive
- https://www.ciphertechsolutions.com/roboski-global-recovery-automation/ - webarchive
- https://www.zscaler.com/blogs/security-research/technical-analysis-purecrypter - webarchive
- https://threatresearch.ext.hp.com/the-many-skins-of-snake-keylogger/ - webarchive
- https://threatresearch.ext.hp.com/pdf-malware-is-not-yet-dead/ - webarchive
- https://any.run/cybersecurity-blog/reverse-engineering-snake-keylogger/ - webarchive
- https://www.bleepingcomputer.com/news/security/pdf-smuggles-microsoft-word-doc-to-drop-snake-keylogger-malware/ - webarchive
- https://blogs.blackberry.com/en/2022/05/dot-net-stubs-sowing-the-seeds-of-discord - webarchive
- https://cert.gov.ua/article/955924 - webarchive
- https://www.youtube.com/watch?v=vzyJp2w8bPE - webarchive
- https://www.ptsecurity.com/ww-en/analytics/pt-esc-threat-intelligence/steganoamor-campaign-ta558-mass-attacking-companies-and-public-institutions-all-around-the-world/ - webarchive
- https://habr.com/ru/company/group-ib/blog/477198/ - webarchive
- https://blogs.blackberry.com/en/2022/06/threat-thursday-unique-delivery-method-for-snake-keylogger - webarchive
- https://insights.infoblox.com/threat-intelligence-reports/threat-intelligence--102 - webarchive
- https://zw01f.github.io/malware%20analysis/snake/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
4h_rat
Internal MISP references
UUID 823f4eb9-ad37-4fab-8e69-3bdae47a0028
which can be used as unique global reference for 4h_rat
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/win.4h_rat - webarchive
- https://attack.mitre.org/groups/G0024 - webarchive
- https://cocomelonc.github.io/malware/2023/09/25/malware-trick-36.html - webarchive
- https://cocomelonc.github.io/tutorial/2021/09/04/simple-malware-av-evasion.html - webarchive
- https://github.com/securitykitten/malware_references/blob/master/crowdstrike-intelligence-report-putter-panda.original.pdf - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
5.t Downloader
Downloader used in suspected APT attack against Vietnam.
Internal MISP references
UUID 685c9c30-aa9f-43ee-a262-43c17c350049
which can be used as unique global reference for 5.t Downloader
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/win.5t_downloader - webarchive
- https://kienmanowar.wordpress.com/2022/01/26/quicknote-analysis-of-malware-suspected-to-be-an-apt-attack-targeting-vietnam/ - webarchive
- https://blog.vincss.net/re022-part-1-quick-analysis-of-malicious-sample-forging-the-official-dispatch-of-the-central-inspection-committee/ - webarchive
- https://research.checkpoint.com/2024/sharp-dragon-expands-towards-africa-and-the-caribbean/ - webarchive
- https://blog.checkpoint.com/research/chinese-espionage-campaign-expands-to-target-africa-and-the-caribbean/ - webarchive
- https://research.checkpoint.com/2023/pandas-with-a-soul-chinese-espionage-attacks-against-southeast-asian-government-entities/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
7ev3n
The NJCCIC describes 7ev3n as a ransomware "that targets the Windows OS and spreads via spam emails containing malicious attachments, as well as file sharing networks. It installs multiple files in the LocalAppData folder, each of which controls different functions including disabling bootup recovery options, deleting the ransomware installation file, encrypting data, and gaining administrator privileges. This variant also adds registry keys that disables various Windows function keys such as F1, F3, F4, F10, Alt, Num Lock, Ctrl, Enter, Escape, Shift, and Tab. Files encrypted by 7ev3n are labeled with a .R5A extension. It also locks victims out of Windows recovery options making it challenging to repair the damage done by 7ev3n."
Internal MISP references
UUID ac2608e9-7851-409f-b842-e265b877a53c
which can be used as unique global reference for 7ev3n
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
8Base
The 8Base ransomware group has remained relatively unknown despite the massive spike in activity in Summer of 2023. The group utilizes encryption paired with “name-and-shame” techniques to compel their victims to pay their ransoms. 8Base has an opportunistic pattern of compromise with recent victims spanning across varied industries. Despite the high amount of compromises, the information regarding identities, methodology, and underlying motivation behind these incidents still remains a mystery. Samples of their ransomware show they are using customized Phobos with SmokeLoader.
Internal MISP references
UUID 7ee60640-29cd-4127-b805-1f2b753e9e15
which can be used as unique global reference for 8Base
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/win.8base - webarchive
- https://krebsonsecurity.com/2023/09/whos-behind-the-8base-ransomware-website/ - webarchive
- https://socradar.io/dark-web-profile-8base-ransomware/ - webarchive
- https://blog.bushidotoken.net/2023/05/unmasking-ransomware-using-stylometric.html - webarchive
- https://www.logpoint.com/en/blog/emerging-threat/defending-against-8base/ - webarchive
- https://blog.talosintelligence.com/deep-dive-into-phobos-ransomware/ - webarchive
- https://blogs.vmware.com/security/2023/06/8base-ransomware-a-heavy-hitting-player.html - webarchive
- https://twitter.com/rivitna2/status/1674718854549831681 - webarchive
- https://blog.talosintelligence.com/talos-ir-q2-2023-quarterly-recap/ - webarchive
- https://blog.sekoia.io/sekoia-io-mid-2023-ransomware-threat-landscape - webarchive
- https://circleid.com/posts/20240530-a-dns-investigation-of-the-phobos-ransomware-8base-attack - webarchive
- https://www.acronis.com/en-sg/cyber-protection-center/posts/8base-ransomware-stays-unseen-for-a-year/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
8.t Dropper
8T_Dropper has been used by Chinese threat actor TA428 in order to install Cotx RAT onto victim's machines during Operation LagTime IT. According to Proofpoint the attack was developed against a number of government agencies in East Asia overseeing government information technology, domestic affairs, foreign affairs, economic development, and political processes. The dropper was delivered through an RTF document exploiting CVE-2018-0798.
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular 8.t Dropper.
Known Synonyms |
---|
8t_dropper |
RoyalRoad |
Internal MISP references
UUID df755d5f-db11-417d-8fed-b7abdc826590
which can be used as unique global reference for 8.t Dropper
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/win.8t_dropper - webarchive
- https://nao-sec.org/2021/01/royal-road-redive.html - webarchive
- https://blog.malwarelab.pl/posts/on_the_royal_road/ - webarchive
- https://medium.com/@Sebdraven/new-version-of-chinoxy-backdoor-using-covid19-document-lure-83fa294c0746 - webarchive
- https://research.checkpoint.com/2023/pandas-with-a-soul-chinese-espionage-attacks-against-southeast-asian-government-entities/ - webarchive
- https://research.checkpoint.com/2019/rancor-the-year-of-the-phish/ - webarchive
- https://tradahacking.vn/another-malicious-document-with-cve-2017-11882-839e9c0bbf2f - webarchive
- https://www.virusbulletin.com/virusbulletin/2020/03/vb2019-paper-attribution-object-using-rtf-object-dimensions-track-apt-phishing-weaponizers/ - webarchive
- https://cdn-cybersecurity.att.com/docs/global-perspective-of-the-sidewinder-apt.pdf - webarchive
- https://malgamy.github.io/malware-analysis/The-Approach-of-TA413-for-Tibetan-Targets/#third-stage - webarchive
- https://go.recordedfuture.com/hubfs/reports/cta-2022-0922.pdf - webarchive
- https://community.riskiq.com/article/56fa1b2f - webarchive
- https://www.accenture.com/_acnmedia/pdf-96/accenture-security-mudcarp.pdf - webarchive
- https://tradahacking.vn/l%C3%A0-1937cn-hay-oceanlotus-hay-lazarus-6ca15fe1b241 - webarchive
- https://vb2020.vblocalhost.com/uploads/VB2020-20.pdf - webarchive
- https://go.crowdstrike.com/rs/281-OBQ-266/images/Report2020CrowdStrikeGlobalThreatReport.pdf - webarchive
- https://www.pwc.co.uk/cyber-security/pdf/pwc-cyber-threats-2020-a-year-in-retrospect.pdf - webarchive
- https://medium.com/@Ilandu/portdoor-malware-afc9d0796cba - webarchive
- https://community.riskiq.com/article/5fe2da7f - webarchive
- https://medium.com/@Sebdraven/malicious-document-targets-vietnamese-officials-acb3b9d8b80a? - webarchive
- https://research.checkpoint.com/2020/vicious-panda-the-covid-campaign - webarchive
- https://ics-cert.kaspersky.com/media/Kaspersky-ICS-CERT-APT-attacks-on-industrial-organizations-in-H1-2021-En.pdf - webarchive
- https://research.checkpoint.com/2020/vicious-panda-the-covid-campaign/ - webarchive
- https://www.sentinelone.com/labs/targets-of-interest-russian-organizations-increasingly-under-attack-by-chinese-apts/ - webarchive
- https://securelist.com/cycldek-bridging-the-air-gap/97157/ - webarchive
- https://www.proofpoint.com/us/threat-insight/post/chinese-apt-operation-lagtime-it-targets-government-information-technology - webarchive
- https://medium.com/@Sebdraven/malicious-document-targets-vietnamese-officials-acb3b9d8b80a - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
9002 RAT
9002 RAT is a Remote Access Tool typically observed to be used by an APT to control a victim's machine. It has been spread over via zero day exploits (e.g. targeting Internet Explorer) as well as via email attachments. The infection chain starts by opening a .LNK (an OLE packager shell object) that executes a Powershell command.
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular 9002 RAT.
Known Synonyms |
---|
HOMEUNIX |
Hydraq |
McRAT |
Internal MISP references
UUID bab647d7-c9d6-4697-8fd2-1295c7429e1f
which can be used as unique global reference for 9002 RAT
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/win.9002 - webarchive
- https://blog.trendmicro.com/trendlabs-security-intelligence/supply-chain-attack-operation-red-signature-targets-south-korean-organizations/ - webarchive
- https://www.infopoint-security.de/medien/the-elderwood-project.pdf - webarchive
- https://www-west.symantec.com/content/dam/symantec/docs/security-center/white-papers/elderwood-project-12-en.pdf - webarchive
- https://www.fireeye.com/blog/threat-research/2013/02/lady-boyle-comes-to-town-with-a-new-exploit.html - webarchive
- https://researchcenter.paloaltonetworks.com/2015/09/chinese-actors-use-3102-malware-in-attacks-on-us-government-and-eu-media/ - webarchive
- https://www.crysys.hu/publications/files/tedi/ukatemicrysys_territorialdispute.pdf - webarchive
- https://www.secureworks.com/research/threat-profiles/bronze-union - webarchive
- https://www.secureworks.com/research/threat-profiles/bronze-express - webarchive
- https://paper.seebug.org/papers/APT/APT_CyberCriminal_Campagin/2013/hidden_lynx.pdf - webarchive
- https://attack.mitre.org/groups/G0001/ - webarchive
- https://www.trendmicro.com/en_my/research/18/h/supply-chain-attack-operation-red-signature-targets-south-korean-organizations.html - webarchive
- https://www.tgsoft.it/news/news_archivio.asp?id=1557&lang=eng - webarchive
- https://www.secureworks.com/research/threat-profiles/bronze-firestone - webarchive
- https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/webworm-espionage-rats - webarchive
- https://www.proofpoint.com/us/threat-insight/post/operation-rat-cook-chinese-apt-actors-use-fake-game-thrones-leaks-lures - webarchive
- https://www.fireeye.com/blog/threat-research/2013/05/ready-for-summer-the-sunshop-campaign.html - webarchive
- http://researchcenter.paloaltonetworks.com/2016/07/unit-42-attack-delivers-9002-trojan-through-google-drive/ - webarchive
- https://www.youtube.com/watch?v=-7Swd1ZetiQ - webarchive
- https://app.box.com/s/z1uanuv1vn3vw5iket1r6bqrmlra0gpn - webarchive
- https://www.secureworks.com/research/threat-profiles/bronze-keystone - webarchive
- https://www.fireeye.com/blog/threat-research/2013/11/operation-ephemeral-hydra-ie-zero-day-linked-to-deputydog-uses-diskless-method.html - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Abaddon
Uses Discord as C&C, has ransomware feature.
Internal MISP references
UUID 97be2d1a-878d-46bd-8ee7-d8798ec61ef1
which can be used as unique global reference for Abaddon
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
AbaddonPOS
MajorGeeks describes this malware as trying to locate credit card data by reading the memory of all processes except itself by first blacklisting its own PID using the GetCurrentProcessId API. Once that data is discovered, it sends this data back to a command and control server using a custom binary protocol instead of HTTP.
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular AbaddonPOS.
Known Synonyms |
---|
PinkKite |
TinyPOS |
Internal MISP references
UUID a492a3e0-13cb-4b7d-93c1-027e7e69b44d
which can be used as unique global reference for AbaddonPOS
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/win.abaddon_pos - webarchive
- https://www.carbonblack.com/2020/05/21/tau-technical-report-new-attack-combines-tinypos-with-living-off-the-land-techniques-for-scraping-credit-card-data/ - webarchive
- https://norfolkinfosec.com/tinypos-and-prolocker-an-odd-relationship/ - webarchive
- https://threatpost.com/new-pos-malware-pinkkite-takes-flight/130428/ - webarchive
- https://medium.com/s2wlab/operation-synctrek-e5013df8d167 - webarchive
- https://www.proofpoint.com/us/threat-insight/post/AbaddonPOS-A-New-Point-Of-Sale-Threat-Linked-To-Vawtrak - webarchive
- https://www.proofpoint.com/us/threat-insight/post/abaddonpos-now-targeting-specific-pos-software - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
abantes
Internal MISP references
UUID 27b54000-26b5-405f-9296-9fbc9217a8c9
which can be used as unique global reference for abantes
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Abbath Banker
Internal MISP references
UUID e46262cd-961f-4c7d-8976-0d35a066ab83
which can be used as unique global reference for Abbath Banker
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
ABCsync
Internal MISP references
UUID 1e6afd04-d7d1-43a0-9ca5-082d418bd397
which can be used as unique global reference for ABCsync
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
AbSent Loader
Internal MISP references
UUID 532d67fc-0c93-4345-80c4-0c1657056d5e
which can be used as unique global reference for AbSent Loader
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
ACBackdoor (Windows)
A Linux backdoor that was apparently ported to Windows. This entry represents the Windows version. It appears the Linux version was written first and the Windows version was ported later, without full functionality. The Linux version offers persistence as well as some process manipulation techniques, though both versions apparently offer the ability to access the command line and execute programs as well as self-update.
Internal MISP references
UUID 9aa1a516-bd88-4038-a37d-cf66c607e68c
which can be used as unique global reference for ACBackdoor (Windows)
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
ACEHASH
ACEHASH is described by FireEye as combined credential harvester that consists of two components, a loader and encrypted/compressed payload. To execute, a password is necessary (e.g. 9839D7F1A0) and the individual modules are addressed with parameters (-m, -w, -h).
Internal MISP references
UUID 51f8c94a-572f-450b-a52f-d3da96302d6b
which can be used as unique global reference for ACEHASH
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/win.acehash - webarchive
- https://www.fireeye.com/blog/threat-research/2019/08/game-over-detecting-and-stopping-an-apt41-operation.html - webarchive
- https://www.welivesecurity.com/2020/05/21/no-game-over-winnti-group/ - webarchive
- https://summit.fireeye.com/content/dam/fireeye-www/summit/cds-2019/presentations/cds19-executive-s08-achievement-unlocked.pdf - webarchive
- https://www.secureworks.com/research/threat-profiles/bronze-atlas - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
AcidBox
Unit42 found AcidBox in February 2019 and describes it as a malware family used by an unknown threat actor in 2017 against Russian entities, as stated by Dr.Web. It reused and improved an exploit for VirtualBox previously used by Turla. The malware itself is a modular toolkit, featuring both usermode and kernelmode components and anti-analysis techniques such as stack-based string obfuscation or dynamic XOR-encoded API usage.
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular AcidBox.
Known Synonyms |
---|
MagicScroll |
Internal MISP references
UUID 4ccc1ec4-6008-4788-95d9-248749f5a7fe
which can be used as unique global reference for AcidBox
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/win.acidbox - webarchive
- https://www.epicturla.com/blog/acidbox-clustering - webarchive
- https://securelist.com/apt-trends-report-q2-2020/97937/ - webarchive
- https://unit42.paloaltonetworks.com/acidbox-rare-malware/ - webarchive
- https://blog.talosintelligence.com/2020/08/attribution-puzzle.html - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
AcridRain
AcridRain is a password stealer written in C/C++. This malware can steal credentials, cookies, credit cards from multiple browsers. It can also dump Telegram and Steam sessions, rob Filezilla recent connections, and more.
Internal MISP references
UUID ffc368a5-2cd0-44ca-869b-223fdb462c41
which can be used as unique global reference for AcridRain
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Acronym
Internal MISP references
UUID bee73d0f-8ff3-44ba-91dc-d883884c754e
which can be used as unique global reference for Acronym
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
ACR Stealer
First introduced in March 2024, ACR Stealer is an information stealer sold as a Malware-as-a-Service (MaaS) on Russian-speaking cybercrime forums by a threat actor named "SheldIO". Researchers posit that this malware is an evolved version of the GrMsk Stealer, which likely aligns with the private stealer that SheldIO has been selling since July 2023. The malware, written in C++, is compatible with Windows 7 through 10, and the seller manages all command and control (C2) infrastructure. ACR Stealer can harvest system information, stored credentials, web browser cookies, cryptocurrency wallets, and configuration files for various programs. Additionally, it employs the dead drop resolver (DDR) technique to obfuscate the actual C2 infrastructure.
Internal MISP references
UUID 9d80476e-7121-4eeb-a39f-689d8eb872ab
which can be used as unique global reference for ACR Stealer
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/win.acr_stealer - webarchive
- https://twitter.com/sekoia_io/status/1784943443157930449 - webarchive
- https://cyble.com/blog/double-trouble-latrodectus-and-acr-stealer-observed-spreading-via-google-authenticator-phishing-site/ - webarchive
- https://www.fortinet.com/blog/threat-research/exploiting-cve-2024-21412-stealer-campaign-unleashed - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Action RAT
Internal MISP references
UUID 57df4c54-3fff-49dd-9657-19265a66f5de
which can be used as unique global reference for Action RAT
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/win.action_rat - webarchive
- https://www.seqrite.com/blog/double-action-triple-infection-and-a-new-rat-sidecopys-persistent-targeting-of-indian-defence - webarchive
- https://threatmon.io/unraveling-the-complex-infection-chain-analysis-of-the-sidecopy-apts-attack-report/ - webarchive
- https://www.seqrite.com/blog/umbrella-of-pakistani-threats-converging-tactics-of-cyber-operations-targeting-india/ - webarchive
- https://www.seqrite.com/blog/sidecopys-multi-platform-onslaught-leveraging-winrar-zero-day-and-linux-variant-of-ares-rat/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Adamantium Thief
Internal MISP references
UUID 28e01527-dbb5-4331-b5bf-5658ebf58297
which can be used as unique global reference for Adamantium Thief
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
AdamLocker
Adam Locker (detected as RANSOM_ADAMLOCK.A) is a ransomware that encrypts targeted files on a victim’s system but offers them a free decryption key which can be accessed through Adf.ly, a URL shortening and advertising service.
Internal MISP references
UUID 1ed36f9a-ae00-4d16-bbf7-e97217385fb1
which can be used as unique global reference for AdamLocker
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Adhubllka
Some Ransomware distributed by TA547 in Australia
Internal MISP references
UUID ebf31d45-922a-42ad-b326-8a72ba6dead7
which can be used as unique global reference for Adhubllka
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
AdKoob
Internal MISP references
UUID ace3cb99-3523-44a1-92cc-9f002cf364bf
which can be used as unique global reference for AdKoob
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
AdvisorsBot
AdvisorsBot is a downloader named after early command and control domains that all contained the word "advisors". The malware is written in C and employs a number of anti-analysis features such as junk code, stack strings and Windows API function hashing.
Internal MISP references
UUID e3f49ec0-614e-4070-a620-5196d45df7b5
which can be used as unique global reference for AdvisorsBot
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Adylkuzz
Internal MISP references
UUID 3d6c3ed5-804d-4d0b-8a01-68bc54ae8c58
which can be used as unique global reference for Adylkuzz
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
AESRT
Ransomware written using .NET.
Internal MISP references
UUID fb0eb7a8-ab32-4371-96b7-2d19f9064ac5
which can be used as unique global reference for AESRT
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Afrodita
Internal MISP references
UUID 4c9f8ad2-ace4-42e5-ab70-efdfaad4d1bd
which can be used as unique global reference for Afrodita
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/win.afrodita - webarchive
- https://twitter.com/CPResearch/status/1201957880909484033 - webarchive
- https://github.com/albertzsigovits/malware-notes/blob/master/Afrodita.md - webarchive
- https://dissectingmalwa.re/not-so-nice-after-all-afrodita-ransomware.html - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
AgendaCrypt
Ransomware written in Go.
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular AgendaCrypt.
Known Synonyms |
---|
Agenda |
Qilin |
Internal MISP references
UUID d430e861-07d3-442a-8444-0bf87e660c26
which can be used as unique global reference for AgendaCrypt
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/win.agendacrypt - webarchive
- https://www.sentinelone.com/labs/crimeware-trends-ransomware-developers-turn-to-intermittent-encryption-to-evade-detection/ - webarchive
- https://www.trendmicro.com/en_us/research/22/l/agenda-ransomware-uses-rust-to-target-more-vital-industries.html - webarchive
- https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RE54L7v - webarchive
- https://www.trendmicro.com/en_us/research/22/h/new-golang-ransomware-agenda-customizes-attacks.html - webarchive
- https://www.trendmicro.com/content/dam/trendmicro/global/en/research/22/h/new-golang-ransomware-agenda-customizes-attacks/IOCs-blog-New%20Golang%20Ransomware%20Agenda%20Customizes%20Attacks.txt - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Agent.BTZ
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Agent.BTZ.
Known Synonyms |
---|
ComRAT |
Minit |
Sun rootkit |
Internal MISP references
UUID d9cc15f7-0880-4ae4-8df4-87c58338d6b8
which can be used as unique global reference for Agent.BTZ
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_btz - webarchive
- https://securelist.com/shedding-skin-turlas-fresh-faces/88069/ - webarchive
- https://www.ironnet.com/blog/russian-cyber-attack-campaigns-and-actors - webarchive
- http://blog.threatexpert.com/2008/11/agentbtz-threat-that-hit-pentagon.html - webarchive
- http://www.intezer.com/new-variants-of-agent-btz-comrat-found/ - webarchive
- https://www.welivesecurity.com/wp-content/uploads/2021/12/eset_jumping_the_air_gap_wp.pdf - webarchive
- https://www.crysys.hu/publications/files/tedi/ukatemicrysys_territorialdispute.pdf - webarchive
- https://www.welivesecurity.com/wp-content/uploads/2020/07/ESET_Threat_Report_Q22020.pdf - webarchive
- https://us-cert.cisa.gov/ncas/analysis-reports/ar20-303a - webarchive
- https://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/waterbug-attack-group.pdf - webarchive
- https://www-west.symantec.com/content/dam/symantec/docs/security-center/white-papers/waterbug-attack-group-16-en.pdf - webarchive
- https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-129a - webarchive
- https://cocomelonc.github.io/tutorial/2022/05/02/malware-pers-3.html - webarchive
- https://www.pwc.co.uk/cyber-security/pdf/pwc-cyber-threats-2020-a-year-in-retrospect.pdf - webarchive
- https://cdn.muckrock.com/foia_files/2021/02/16/21R019_RESPONSE.pdf - webarchive
- https://www.secureworks.com/research/threat-profiles/iron-hunter - webarchive
- https://blog.gdata.de/2015/01/23779-weiterentwicklung-anspruchsvoller-spyware-von-agent-btz-zu-comrat - webarchive
- https://docs.broadcom.com/doc/waterbug-attack-group - webarchive
- https://securelist.com/blog/virus-watch/58551/agent-btz-a-source-of-inspiration/ - webarchive
- https://www.welivesecurity.com/wp-content/uploads/2020/05/ESET_Turla_ComRAT.pdf - webarchive
- https://ryancor.medium.com/deobfuscating-powershell-malware-droppers-b6c34499e41d - webarchive
- https://www.msreverseengineering.com/blog/2020/8/31/an-exhaustively-analyzed-idb-for-comrat-v4 - webarchive
- https://artemonsecurity.com/snake_whitepaper.pdf - webarchive
- https://ti.qianxin.com/uploads/2020/02/13/cb78386a082f465f259b37dae5df4884.pdf - webarchive
- https://www.gdatasoftware.com/blog/2014/11/23937-the-uroburos-case-new-sophisticated-rat-identified - webarchive
- https://unit42.paloaltonetworks.com/ironnetinjector/ - webarchive
- http://www.intezer.com/new-variants-of-agent-btz-comrat-found-part-2/ - webarchive
- https://www.welivesecurity.com/2020/05/26/agentbtz-comratv4-ten-year-journey/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Agent Racoon
Agent Racoon is a .NET-based backdoor malware that leverages DNS for covert C2 communication, employing randomized subdomains and Punycode encoding to evade detection. It features encrypted communication using a unique key per sample, supports remote command execution, and facilitates file transfers. Despite lacking an inherent persistence mechanism, it relies on external methods like scheduled tasks for execution. The malware, active since at least 2020, has targeted organizations in the U.S., Middle East, and Africa, including non-profits and government sectors. It disguises itself as legitimate binaries such as Google Update and MS OneDrive Updater, using obfuscation techniques like Base64 encoding and timestamp modifications to avoid detection.
Internal MISP references
UUID f3dde421-0f6b-4a2e-b591-64820169ef1a
which can be used as unique global reference for Agent Racoon
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Agent Tesla
A .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Agent Tesla.
Known Synonyms |
---|
AgenTesla |
AgentTesla |
Negasteal |
Internal MISP references
UUID b88e29cf-79d9-42bc-b369-0383b5e04380
which can be used as unique global reference for Agent Tesla
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla - webarchive
- https://www.zscaler.com/blogs/security-research/catching-rats-over-custom-protocols - webarchive
- https://www.inde.nz/blog/inside-agenttesla - webarchive
- https://securityintelligence.com/x-force/spam-trends-campaigns-senior-superlatives-2023/ - webarchive
- https://blog.malwarebytes.com/cybercrime/2020/04/new-agenttesla-variant-steals-wifi-credentials/ - webarchive
- https://www.fortinet.com/blog/threat-research/fake-purchase-order-used-to-deliver-agent-tesla - webarchive
- https://malgamy.github.io/malware-analysis/Deep-Analysis-Agent-Tesla/ - webarchive
- https://www.bitsight.com/blog/data-insights-agenttesla-and-originlogger-victims - webarchive
- https://www.ciphertechsolutions.com/roboski-global-recovery-automation/ - webarchive
- https://blog.apnic.net/2022/03/31/how-to-detect-and-prevent-common-data-exfiltration-attacks/ - webarchive
- https://cip.gov.ua/en/news/khto-stoyit-za-kiberatakami-na-ukrayinsku-kritichnu-informaciinu-infrastrukturu-statistika-15-22-bereznya - webarchive
- https://medium.com/@mariohenkel/decrypting-agenttesla-strings-and-config-b9000b18c996?sk=fcead9538516eeb3daa7b53cb537f6f4 - webarchive
- https://www.telsy.com/download/4832/ - webarchive
- https://malwr-analysis.com/2020/04/05/trojan-agent-tesla-malware-analysis/ - webarchive
- https://www.youtube.com/watch?v=Q9_1xNbVQPY - webarchive
- https://researchcenter.paloaltonetworks.com/2017/09/unit42-analyzing-various-layers-agentteslas-packing/ - webarchive
- https://isc.sans.edu/diary/rss/28190 - webarchive
- https://us-cert.cisa.gov/ncas/alerts/aa20-345a - webarchive
- https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/negasteal-uses-hastebin-for-fileless-delivery-of-crysis-ransomware - webarchive
- https://www.intrinsec.com/wp-content/uploads/2023/09/TLP-CLEAR-20230912-EN-GuLoader-Information-report.pdf - webarchive
- https://blog.morphisec.com/agent-tesla-a-day-in-a-life-of-ir - webarchive
- https://cofense.com/strategic-analysis-agent-tesla-expands-targeting-and-networking-capabilities/ - webarchive
- https://www.bitdefender.com/blog/hotforsecurity/bitdefender-labs-sees-increased-malicious-and-scam-activity-exploiting-the-war-in-ukraine - webarchive
- https://news.sophos.com/en-us/2021/04/21/nearly-half-of-malware-now-use-tls-to-conceal-communications/ - webarchive
- https://isc.sans.edu/diary/27666 - webarchive
- https://www.netskope.com/blog/infected-powerpoint-files-using-cloud-services-to-deliver-multiple-malware - webarchive
- https://mrt4ntr4.github.io/How-Analysing-an-AgentTesla-Could-Lead-To-Attackers-Inbox-2/ - webarchive
- https://blogs.blackberry.com/en/2022/05/dot-net-stubs-sowing-the-seeds-of-discord? - webarchive
- https://malwarebookreports.com/agent-teslaggah/ - webarchive
- https://www.logpoint.com/en/blog/agentteslas-capabilities-review-detection-strategies/ - webarchive
- https://isc.sans.edu/diary/28202 - webarchive
- https://viuleeenz.github.io/posts/2023/08/agent-tesla-building-an-effective-decryptor/ - webarchive
- https://www.fortinet.com/blog/threat-research/phishing-malware-hijacks-bitcoin-addresses-delivers-new-agent-tesla-variant - webarchive
- https://www.fortinet.com/blog/threat-research/analysis-of-new-agent-tesla-spyware-variant.html - webarchive
- https://www.hornetsecurity.com/en/threat-research/vba-purging-malspam-campaigns/ - webarchive
- https://guillaumeorlando.github.io/AgentTesla - webarchive
- https://www.proofpoint.com/us/blog/threat-insight/dtpacker-net-packer-curious-password-1 - webarchive
- https://blog.minerva-labs.com/preventing-agenttesla - webarchive
- https://cert.gov.ua/article/861292 - webarchive
- https://github.com/echocti/ECHO-Reports/blob/main/Malware%20Analysis%20Report/Agent%20Tesla/Agent%20Tesla%20Technical%20Analysis%20Report.pdf - webarchive
- https://news.sophos.com/en-us/2021/02/02/agent-tesla-amps-up-information-stealing-attacks/ - webarchive
- https://securityintelligence.com/posts/roboski-global-recovery-automation/ - webarchive
- https://www.proofpoint.com/us/threat-insight/post/new-whiteshadow-downloader-uses-microsoft-sql-retrieve-malware - webarchive
- https://research.openanalysis.net/dotnet/xorstringsnet/agenttesla/2023/04/16/xorstringsnet.html - webarchive
- https://blog.talosintelligence.com/2020/12/2020-year-in-malware.html - webarchive
- https://blog.cluster25.duskrise.com/2023/10/12/cve-2023-38831-russian-attack - webarchive
- https://research.checkpoint.com/2023/following-the-scent-of-trickgate-6-year-old-packer-used-to-deploy-the-most-wanted-malware/ - webarchive
- https://blog.talosintelligence.com/2019/07/sweed-agent-tesla.html - webarchive
- https://blog.talosintelligence.com/ipfs-abuse/ - webarchive
- https://isc.sans.edu/diary/Infostealer+Malware+with+Double+Extension/29354 - webarchive
- https://blog.qualys.com/vulnerabilities-threat-research/2022/02/02/catching-the-rat-called-agent-tesla - webarchive
- https://research.checkpoint.com/2024/foxit-pdf-flawed-design-exploitation/ - webarchive
- https://news.sophos.com/en-us/2021/06/02/amsi-bypasses-remain-tricks-of-the-malware-trade/ - webarchive
- https://inquest.net/blog/2021/11/02/adults-only-malware-lures - webarchive
- https://osamaellahi.medium.com/unfolding-agent-tesla-the-art-of-credentials-harvesting-f1a988cfd137 - webarchive
- https://isc.sans.edu/forums/diary/PowerPoint+attachments+Agent+Tesla+and+code+reuse+in+malware/28154/ - webarchive
- https://isc.sans.edu/diary/rss/27092 - webarchive
- https://lab52.io/blog/a-twisted-malware-infection-chain/ - webarchive
- https://www.secureworks.com/research/threat-profiles/gold-galleon - webarchive
- https://www.secureworks.com/research/gold-galleon-how-a-nigerian-cyber-crew-plunders-the-shipping-industry - webarchive
- https://www.telsy.com/wp-content/uploads/ATR_82599-1.pdf - webarchive
- https://stairwell.com/resources/proactive-response-anydesk-any-breach/ - webarchive
- https://www.infinitumit.com.tr/agent-tesla-malware-raporu/ - webarchive
- https://www.spamhaus.org/news/images/botnet-report-2020-q2/2020-q2-spamhaus-botnet-threat-report.pdf - webarchive
- https://asec.ahnlab.com/ko/29133/ - webarchive
- https://unit42.paloaltonetworks.com/covid-19-themed-cyber-attacks-target-government-and-medical-organizations/ - webarchive
- https://yoroi.company/research/serverless-infostealer-delivered-in-est-european-countries/ - webarchive
- https://research.checkpoint.com/2024/agent-tesla-targeting-united-states-and-australia/ - webarchive
- https://blog.morphisec.com/revealing-the-snip3-crypter-a-highly-evasive-rat-loader - webarchive
- https://blog.checkpoint.com/security/march-2023s-most-wanted-malware-new-emotet-campaign-bypasses-microsoft-blocks-to-distribute-malicious-onenote-files/ - webarchive
- https://www.pwc.co.uk/cyber-security/pdf/pwc-cyber-threats-2020-a-year-in-retrospect.pdf - webarchive
- https://medium.com/@b.magnezi/malware-analysis-agenttesla-2af3d73a7825 - webarchive
- https://blog.fortinet.com/2017/06/28/in-depth-analysis-of-net-malware-javaupdtr - webarchive
- https://youtu.be/hxaeWyK8gMI - webarchive
- https://isc.sans.edu/forums/diary/AgentTesla+Delivered+via+a+Malicious+PowerPoint+AddIn/26162/ - webarchive
- https://marcoramilli.com/2021/01/09/c2-traffic-patterns-personal-notes/ - webarchive
- https://blog.netlab.360.com/purecrypter - webarchive
- https://guillaumeorlando.github.io/GorgonInfectionchain - webarchive
- https://www.splunk.com/en_us/blog/security/inside-the-mind-of-a-rat-agent-tesla-detection-and-analysis.html - webarchive
- https://youtu.be/QQuRp7Qiuzg - webarchive
- https://www.zscaler.com/blogs/research/agent-tesla-keylogger-delivered-using-cybersquatting - webarchive
- http://ropgadget.com/posts/originlogger.html - webarchive
- https://research.loginsoft.com/threat-research/from-innocence-to-malice-the-onenote-malware-campaign-uncovered/ - webarchive
- https://blog.sekoia.io/privateloader-the-loader-of-the-prevalent-ruzki-ppi-service/ - webarchive
- https://community.riskiq.com/article/56e28880 - webarchive
- https://blogs.juniper.net/en-us/threat-research/new-pastebin-like-service-used-in-multiple-malware-campaigns - webarchive
- https://www.bleepingcomputer.com/news/security/russia-ukraine-war-exploited-as-lure-for-malware-distribution/ - webarchive
- https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/ipfs-a-new-data-frontier-or-a-new-cybercriminal-hideout - webarchive
- https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/the-many-roads-leading-to-agent-tesla/ - webarchive
- https://www.denexus.io/wp-content/uploads/2021/02/Threat-actor-targeting-gas-oil-supply-chains_public.pdf - webarchive
- https://blogs.juniper.net/en-us/security/aggah-malware-campaign-expands-to-zendesk-and-github-to-host-its-malware - webarchive
- https://youtu.be/BM38OshcozE - webarchive
- https://unit42.paloaltonetworks.com/originlogger/ - webarchive
- https://twitter.com/MsftSecIntel/status/1392219299696152578 - webarchive
- https://forensicitguy.github.io/agenttesla-rtf-dotnet-tradecraft/ - webarchive
- https://forensicitguy.github.io/agenttesla-vba-certutil-download/ - webarchive
- https://yoroi.company/research/office-documents-may-the-xll-technique-change-the-threat-landscape-in-2022/ - webarchive
- https://www.seqrite.com/blog/gorgon-apt-targeting-msme-sector-in-india/ - webarchive
- https://malwatch.github.io/posts/agent-tesla-malware-analysis/ - webarchive
- https://blog.netlab.360.com/purecrypter-is-busy-pumping-out-various-malicious-malware-families/ - webarchive
- https://thisissecurity.stormshield.com/2018/01/12/agent-tesla-campaign/ - webarchive
- https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/another-archive-format-smuggling-malware/ - webarchive
- https://yoroi.company/research/the-wayback-campaign-a-large-scale-operation-hiding-in-plain-sight/ - webarchive
- https://unit42.paloaltonetworks.com/malicious-compiled-html-help-file-agent-tesla/ - webarchive
- https://threatresearch.ext.hp.com/aggah-campaigns-latest-tactics-victimology-powerpoint-dropper-and-cryptocurrency-stealer/ - webarchive
- https://team-cymru.com/blog/2022/07/12/an-analysis-of-infrastructure-linked-to-the-hagga-threat-actor - webarchive
- http://www.secureworks.com/research/threat-profiles/gold-galleon - webarchive
- https://www.ptsecurity.com/ww-en/analytics/pt-esc-threat-intelligence/steganoamor-campaign-ta558-mass-attacking-companies-and-public-institutions-all-around-the-world/ - webarchive
- https://cocomelonc.github.io/tutorial/2022/04/20/malware-pers-1.html - webarchive
- https://forensicitguy.github.io/a-tale-of-two-dropper-scripts/ - webarchive
- https://malwarebreakdown.com/2018/01/11/malspam-entitled-invoice-attched-for-your-reference-delivers-agent-tesla-keylogger/ - webarchive
- https://www.cisecurity.org/insights/blog/top-10-malware-march-2022 - webarchive
- https://securelist.com/agent-tesla-malicious-spam-campaign/107478/ - webarchive
- https://community.riskiq.com/article/40000d46 - webarchive
- http://blog.nsfocus.net/sweed-611/ - webarchive
- https://www.lac.co.jp/lacwatch/report/20220307_002893.html - webarchive
- https://www.checkpoint.com/press/2022/march-2022s-most-wanted-malware-easter-phishing-scams-help-emotet-assert-its-dominance/ - webarchive
- https://news.sophos.com/en-us/2020/05/14/raticate/ - webarchive
- https://cocomelonc.github.io/malware/2022/07/30/malware-av-evasion-8.html - webarchive
- https://cocomelonc.github.io/tutorial/2021/09/06/simple-malware-av-evasion-2.html - webarchive
- https://www.elastic.co/security-labs/attack-chain-leads-to-xworm-and-agenttesla - webarchive
- https://www.gdatasoftware.com/blog/global-pandemic-remcos-tesla-netwire - webarchive
- https://www.proofpoint.com/us/threat-insight/post/coronavirus-threat-landscape-update - webarchive
- https://www.vmray.com/cyber-security-blog/threat-bulletin-agent-tesla/ - webarchive
- https://unit42.paloaltonetworks.com/excel-add-ins-malicious-xll-files-agent-tesla/ - webarchive
- https://www.sophos.com/en-us/medialibrary/pdfs/technical-papers/sophos-2021-threat-report.pdf - webarchive
- https://mp.weixin.qq.com/s/X0kAIHOSldiFDthb4IsmbQ - webarchive
- https://www.malwarebytes.com/blog/threat-intelligence/2022/20221121-threat-intel-report-final.pdf - webarchive
- https://www.bitsight.com/blog/exfiltration-over-telegram-bots-skidding-infostealer-logs - webarchive
- https://0xmrmagnezi.github.io/malware%20analysis/AgentTesla/ - webarchive
- https://blog.malwarelab.pl/posts/basfu_aggah/ - webarchive
- https://threatresearch.ext.hp.com/wp-content/uploads/2021/03/HP_Bromium_Threat_Insights_Report_Q4_2020.pdf - webarchive
- https://isc.sans.edu/diary/27088 - webarchive
- https://www.secureworks.com/research/darktortilla-malware-analysis - webarchive
- https://mrt4ntr4.github.io/How-Analysing-an-AgentTesla-Could-Lead-To-Attackers-Inbox-1/ - webarchive
- https://blog.malwarebytes.com/threat-intelligence/2022/05/nigerian-tesla-419-scammer-gone-malware-distributor-unmasked/ - webarchive
- https://www.lastline.com/labsblog/evolution-of-excel-4-0-macro-weaponization/ - webarchive
- https://youtu.be/7AifHTCldZI - webarchive
- https://menshaway.blogspot.com/2021/04/agenttesla-malware.html - webarchive
- https://labs.sentinelone.com/agent-tesla-old-rat-uses-new-tricks-to-stay-on-top/ - webarchive
- https://cyber-forensics.blog/2024/05/06/formbook-analysis/ - webarchive
- https://www.difesaesicurezza.com/cyber/cybercrime-rfq-dalla-turchia-veicola-agenttesla-e-zgrat/ - webarchive
- https://blogs.blackberry.com/en/2022/05/dot-net-stubs-sowing-the-seeds-of-discord - webarchive
- https://blogs.blackberry.com/en/2021/06/threat-thursday-agent-tesla-infostealer-malware - webarchive
- https://embee-research.ghost.io/agenttesla-full-analysis-api-hashing/ - webarchive
- https://www.proofpoint.com/us/blog/threat-insight/commodity-net-packers-use-embedded-images-hide-payloads - webarchive
- https://yoroi.company/research/cyber-criminal-espionage-operation-insists-on-italian-manufacturing/ - webarchive
- https://community.riskiq.com/article/6337984e - webarchive
- http://l1v1ngc0d3.wordpress.com/2021/11/12/agenttesla-dropped-via-nsis-installer/ - webarchive
- https://www.welivesecurity.com/2021/01/12/operation-spalax-targeted-malware-attacks-colombia/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
AgfSpy
The agfSpy backdoor retrieves configuration and commands from its C&C server. These commands allow the backdoor to execute shell commands and send the execution results back to the server. It also enumerates directories and can list, upload, download, and execute files, among other functions. The capabilities of agfSpy are very similar to dneSpy, except each backdoor uses a different C&C server and various formats in message exchanges.
Internal MISP references
UUID 405fe149-1454-4e8c-a4a3-d56e0c5f62d7
which can be used as unique global reference for AgfSpy
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Ahtapot
Internal MISP references
UUID 549b23b1-6f53-494e-a302-1d00aa71043b
which can be used as unique global reference for Ahtapot
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Akira (Windows)
Internal MISP references
UUID 834635f7-fb0f-472c-913e-fb112ae29fdc
which can be used as unique global reference for Akira (Windows)
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/win.akira - webarchive
- https://www.microsoft.com/en-us/security/blog/2023/10/11/automatic-disruption-of-human-operated-attacks-through-containment-of-compromised-user-accounts/ - webarchive
- https://arcticwolf.com/resources/blog/arctic-wolf-labs-observes-increased-fog-and-akira-ransomware-activity-linked-to-sonicwall-ssl-vpn/ - webarchive
- https://arcticwolf.com/resources/blog/follow-on-extortion-campaign-targeting-victims-of-akira-and-royal-ransomware/ - webarchive
- https://www.intrinsec.com/akira_ransomware/ - webarchive
- https://cybercx.com.au/blog/akira-ransomware/ - webarchive
- https://news.sophos.com/en-us/2023/12/20/cryptoguard-an-asymmetric-approach-to-the-ransomware-battle/ - webarchive
- https://blog.sekoia.io/sekoia-io-mid-2023-ransomware-threat-landscape - webarchive
- https://arcticwolf.com/resources/blog/conti-and-akira-chained-together/ - webarchive
- https://securelist.com/crimeware-report-fakesg-akira-amos/111483/ - webarchive
- https://www.s-rminform.com/cyber-intelligence-briefing/uncovering-akira-privilege-escalation-techniques - webarchive
- https://www.loginsoft.com/post/akira-ransomware-the-evolution-of-a-major-threat - webarchive
- https://www.bankinfosecurity.com/blogs/akira-ransomware-apparently-in-decline-but-still-threat-p-3480 - webarchive
- https://www.trellix.com/about/newsroom/stories/research/akira-ransomware/ - webarchive
- https://github.com/vc0RExor/Malware-Threat-Reports/blob/main/Ransomware/Akira/Akira-The_old_new_style_crime_EN_Aaron_Jornet.pdf - webarchive
- https://decoded.avast.io/threatresearch/decrypted-akira-ransomware/ - webarchive
- https://news.sophos.com/en-us/2023/05/09/akira-ransomware-is-bringin-88-back/ - webarchive
- https://www.trellix.com/en-us/about/newsroom/stories/research/akira-ransomware.html - webarchive
- https://stairwell.com/resources/akira-pulling-on-the-chains-of-ransomware/ - webarchive
- https://twitter.com/MalGamy12/status/1651972583615602694 - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Albaniiutas
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Albaniiutas.
Known Synonyms |
---|
BlueTraveller |
Internal MISP references
UUID dff7e10c-41ca-481d-8003-73169803272d
which can be used as unique global reference for Albaniiutas
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/win.albaniiutas - webarchive
- https://decoded.avast.io/luigicamastra/apt-group-targeting-governmental-agencies-in-east-asia/?utm_source=rss&utm_medium=rss&utm_campaign=apt-group-targeting-governmental-agencies-in-east-asia - webarchive
- https://blog.group-ib.com/task - webarchive
- https://www.group-ib.com/blog/task/ - webarchive
- https://decoded.avast.io/luigicamastra/apt-group-targeting-governmental-agencies-in-east-asia - webarchive
- https://insight-jp.nttsecurity.com/post/102gkfp/pandas-new-arsenal-part-2-albaniiutas - webarchive
- https://decoded.avast.io/luigicamastra/apt-group-targeting-governmental-agencies-in-east-asia/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Aldibot
According to Trend Micro Encyclopia: ALDIBOT first appeared in late August 2012 in relevant forums. Variants can steal passwords from the browser Mozilla Firefox, instant messenger client Pidgin, and the download manager jDownloader. ALDIBOT variants send the gathered information to their command-and-control (C&C) servers.
This malware family can also launch Distributed Denial of Service (DDoS) attacks using different protocols such as HTTP, TCP, UDP, and SYN. It can also perform flood attacks via Slowloris and Layer 7.
This bot can also be set up as a SOCKS proxy to abuse the infected machine as a proxy for any protocols.
This malware family can download and execute arbitrary files, and update itself. Variants can steal information, gathering the infected machine’s hardware identification (HWID), host name, local IP address, and OS version.
This backdoor executes commands from a remote malicious user, effectively compromising the affected system.
Internal MISP references
UUID 43ec8adc-0658-4765-be20-f22679097fab
which can be used as unique global reference for Aldibot
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Alfonso Stealer
Internal MISP references
UUID a76874b3-12d0-4dec-9813-01819e6b6d49
which can be used as unique global reference for Alfonso Stealer
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Project Alice
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Project Alice.
Known Synonyms |
---|
AliceATM |
PrAlice |
Internal MISP references
UUID 41bfc8ad-ce2c-4ede-aa54-b3240a5cc8ca
which can be used as unique global reference for Project Alice
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/win.alice_atm - webarchive
- https://documents.trendmicro.com/assets/white_papers/wp-cashing-in-on-atm-malware.pdf - webarchive
- https://blog.talosintelligence.com/2019/05/10-years-of-virtual-dynamite.html - webarchive
- https://www.symantec.com/security-center/writeup/2016-122104-0203-99 - webarchive
- http://blog.trendmicro.com/trendlabs-security-intelligence/alice-lightweight-compact-no-nonsense-atm-malware/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Alina POS
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Alina POS.
Known Synonyms |
---|
alina_eagle |
alina_spark |
katrina |
Internal MISP references
UUID 27d90cd6-095a-4c28-a6f2-d1b47eae4f70
which can be used as unique global reference for Alina POS
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/win.alina_pos - webarchive
- https://blog.centurylink.com/alina-point-of-sale-malware-still-lurking-in-dns/ - webarchive
- https://blog.trendmicro.com/trendlabs-security-intelligence/two-new-pos-malware-affecting-us-smbs/ - webarchive
- https://blog.trendmicro.com/trendlabs-security-intelligence/operation-black-atlas-endangers-in-store-card-payments-and-smbs-worldwide-switches-between-blackpos-and-other-tools/ - webarchive
- https://www.trustwave.com/Resources/SpiderLabs-Blog/Alina-POS-malware--sparks--off-a-new-variant/ - webarchive
- https://www.trustwave.com/Resources/SpiderLabs-Blog/Alina--Following-The-Shadow-Part-1/ - webarchive
- https://www.trustwave.com/Resources/SpiderLabs-Blog/Alina--Following-The-Shadow-Part-2/ - webarchive
- http://www.xylibox.com/2013/02/alina-34-pos-malware.html - webarchive
- https://www.trustwave.com/Resources/SpiderLabs-Blog/Alina--Casting-a-Shadow-on-POS/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
AllaKore
AllaKore is a simple Remote Access Tool written in Delphi, first observed in 2015 but still in early stages of development. It implements the RFB protocol which uses frame buffers and thus is able to send back only the changes of screen frames to the controller, speeding up the transport and visualization control.
Internal MISP references
UUID fb1c6035-42ee-403c-a2ae-a53f7ab2de00
which can be used as unique global reference for AllaKore
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/win.allakore - webarchive
- https://ics-cert.kaspersky.com/media/Kaspersky-ICS-CERT-APT-attacks-on-industrial-organizations-in-H1-2021-En.pdf - webarchive
- https://sebdraven.medium.com/copy-cat-of-apt-sidewinder-1893059ca68d - webarchive
- https://www.seqrite.com/documents/en/white-papers/Seqrite-WhitePaper-Operation-SideCopy.pdf - webarchive
- https://s3.amazonaws.com/talos-intelligence-site/production/document_files/files/000/095/591/original/062521_SideCopy_%281%29.pdf?1625657388 - webarchive
- https://github.com/Anderson-D/AllaKore - webarchive
- https://s3.amazonaws.com/talos-intelligence-site/production/document_files/files/000/095/591/original/062521_SideCopy_%281%29.pdf - webarchive
- https://www.seqrite.com/blog/sidecopys-multi-platform-onslaught-leveraging-winrar-zero-day-and-linux-variant-of-ares-rat/ - webarchive
- https://threatmon.io/the-anatomy-of-a-sidecopy-attack-from-rar-exploits-to-allakore-rat/ - webarchive
- https://twitter.com/_re_fox/status/1212070711206064131 - webarchive
- https://www.team-cymru.com/post/allakore-d-the-sidecopy-train - webarchive
- https://blog.talosintelligence.com/2021/07/sidecopy.html - webarchive
- https://www.seqrite.com/blog/umbrella-of-pakistani-threats-converging-tactics-of-cyber-operations-targeting-india/ - webarchive
- https://s3.amazonaws.com/talos-intelligence-site/production/document_files/files/000/095/594/original/Network_IOCs_list_for_coverage.txt?1625657479 - webarchive
- https://s3.amazonaws.com/talos-intelligence-site/production/document_files/files/000/095/592/original/Hashes_IOCs_for_coverage.txt - webarchive
- https://www.seqrite.com/blog/pakistani-apts-escalate-attacks-on-indian-gov-seqrite-labs-unveils-threats-and-connections/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Allaple
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Allaple.
Known Synonyms |
---|
Starman |
Internal MISP references
UUID 6aabb492-e282-40fb-a840-fe4e643ec094
which can be used as unique global reference for Allaple
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
AllcomeClipper
Allcome is classified as a clipper malware. Clippers are threats designed to access information saved in the clipboard (the temporary buffer space where copied data is stored) and substitute it with another. This attack is targeted at users who are active in the cryptocurrency sector mainly.
Internal MISP references
UUID 43ca1245-a5e0-4b44-9892-cf317170c7b8
which can be used as unique global reference for AllcomeClipper
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Almanahe
Internal MISP references
UUID 352f79b1-6862-4164-afa3-a1d787c40ec1
which can be used as unique global reference for Almanahe
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Alma Communicator
Internal MISP references
UUID a0881a0c-e677-495b-b475-290af09bb716
which can be used as unique global reference for Alma Communicator
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/win.alma_communicator - webarchive
- https://unit42.paloaltonetworks.com/dns-tunneling-in-the-wild-overview-of-oilrigs-dns-tunneling/ - webarchive
- https://researchcenter.paloaltonetworks.com/2017/11/unit42-oilrig-deploys-alma-communicator-dns-tunneling-trojan/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
AlmaLocker
Internal MISP references
UUID b5138914-6c2b-4c8e-b182-d94973fe5a6b
which can be used as unique global reference for AlmaLocker
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
AlmondRAT
AlmondRAT is a .NET Remote Access Trojan deployed by the Bitter APT group. It is capable of collecting system information, modifying and exfiltrating data and allows for remote command execution.
Internal MISP references
UUID c5fa22fd-5869-4a4d-b5fc-c3be18255d2e
which can be used as unique global reference for AlmondRAT
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
ALPC Local PrivEsc
Internal MISP references
UUID 86517f1a-6e67-47ba-95dd-84b3125ad983
which can be used as unique global reference for ALPC Local PrivEsc
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Alphabet Ransomware
The Alphabet ransomware is a new screenlocker that is currently being developed by a criminal developer. As the malware is not ready it does not affect any user files.
The virus includes a screenlocking function which locks the user’s screen and prohibits any interaction with the computer.
Internal MISP references
UUID 5060756f-8385-465d-a7dd-7bf09a54da92
which can be used as unique global reference for Alphabet Ransomware
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
AlphaLocker
A new form of ransomware named AlphaLocker that is built by cybercriminals for cybercriminals. Like all incarnations of Ransomware As A Service (RaaS), the AlphaLocker malware program can be purchased and launched by pretty much anyone who wants to get into the ransomware business. What makes AlphaLocker different from other forms of RaaS is its relatively cheap cost. The ransomware can be purchased for just $65 in bitcoin.
AlphaLocker, also known as Alpha Ransomware, is based on the EDA2 ransomware, an educational project open-sourced on GitHub last year by Turkish researcher Utku Sen. A Russian coder seems to have cloned this repository before it was taken down and used it to create his ransomware, a near-perfect clone of EDA2. The ransomware's author, is said to be paying a great deal of attention to updating the ransomware with new features, so it would always stay ahead of antivirus engines, and evade detection.
AlphaLocker's encryption process starts when the ransomware contacts its C&C server. The server generates a public and a private key via the RSA-2048 algorithm, sending the public key to the user's computer and saving the private key to its server. On the infected computer, the ransomware generates an AES-256 key for each file it encrypts, and then encrypts this key with the public RSA key, and sent to the C&C server.
To decrypt their files, users have to get ahold of the private RSA key which can decrypt the AES-encrypted files found on their computers. Users have to pay around 0.35 Bitcoin (~$450) to get this key, packaged within a nice decrypter.
Internal MISP references
UUID c1b9e8c5-9283-4dbe-af10-45956a446fb7
which can be used as unique global reference for AlphaLocker
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
AlphaNC
Internal MISP references
UUID 6e94186c-987e-43da-be2d-9b44f254c8b9
which can be used as unique global reference for AlphaNC
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
AlphaSeed
Internal MISP references
UUID 966c5a6d-16b8-43b1-acbd-163e904d4a03
which can be used as unique global reference for AlphaSeed
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/win.alphaseed - webarchive
- https://asec.ahnlab.com/en/60054/ - webarchive
- https://medium.com/s2wblog/kimsuky-disguised-as-a-korean-company-signed-with-a-valid-certificate-to-distribute-troll-stealer-cfa5d54314e2 - webarchive
- https://medium.com/s2wblog/detailed-analysis-of-alphaseed-a-new-version-of-kimsukys-appleseed-written-in-golang-2c885cce352a - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Alreay
Alreay is a remote access trojan that uses HTTP(S) or TCP for communication with its C&C server.
It uses either RC4 or DES for encryption of its configuration, which is stored in the registry.
It sends detailed information about the victim's environment, like computer name, Windows version, system locale, and network configuration.
It supports almost 25 commands that include operations on the victim’s filesystem, basic process management, file exfiltration, command line execution, and process injection of an executable downloaded from the attacker’s C&C server. As in many RATs from Lazarus arsenal, the commands are indexed by 32-bit integers, starting with values like 0x21A8B293, 0x23FAE29C or 0x91B93485.
It comes either as an EXE or as a DLL with the internal DLL name t_client_dll.dll. It may contain statically linked code from open-source libraries like Mbed TLS or zLib (version 1.0.1).
Alreay RAT was observed in 2016-2017, running on networks of banks operating SWIFT Alliance software.
Internal MISP references
UUID d258de39-e351-47e3-b619-731c87f13d9c
which can be used as unique global reference for Alreay
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Alureon
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Alureon.
Known Synonyms |
---|
Olmarik |
Pihar |
TDL |
TDSS |
wowlik |
Internal MISP references
UUID ad4e6779-59a6-4ad6-98de-6bd871ddb271
which can be used as unique global reference for Alureon
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/win.alureon - webarchive
- http://contagiodump.blogspot.com/2010/02/list-of-aurora-hydraq-roarur-files.html - webarchive
- https://twitter.com/Sebdraven/status/1496878431719473155 - webarchive
- https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/troj64_wowlik.vt - webarchive
- https://www.youtube.com/watch?v=FttiysUZmDw - webarchive
- https://archive.f-secure.com/weblog/archives/The_Case_of__TDL3.pdf - webarchive
- http://contagiodump.blogspot.com/2012/02/purple-haze-bootkit.html - webarchive
- http://contagiodump.blogspot.com/2011/02/tdss-tdl-4-alureon-32-bit-and-64-bit.html - webarchive
- https://securelist.com/tdss/36314/ - webarchive
- https://www.virusbulletin.com/virusbulletin/2016/01/paper-notes-click-fraud-american-story/ - webarchive
- https://www.johannesbader.ch/2016/01/the-dga-in-alureon-dnschanger/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Amadey
Amadey is a botnet that appeared around October 2018 and is being sold for about $500 on Russian-speaking hacking forums. It periodically sends information about the system and installed AV software to its C2 server and polls to receive orders from it. Its main functionality is that it can load other payloads (called "tasks") for all or specifically targeted computers compromised by the malware.
Internal MISP references
UUID 77f2c81f-be07-475a-8d77-f59b4847f696
which can be used as unique global reference for Amadey
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/win.amadey - webarchive
- https://github.com/muha2xmad/Python/blob/bdc7a711d5a775f8ae47b591f20fdd2e1360b77b/Amadey/amadey_config_extractor.ipynb - webarchive
- https://embeeresearch.io/shodan-censys-queries/ - webarchive
- https://blog.talosintelligence.com/2021/08/raccoon-and-amadey-install-servhelper.html - webarchive
- https://cocomelonc.github.io/tutorial/2021/09/06/simple-malware-av-evasion-2.html - webarchive
- https://medium.com/csis-techblog/gcleaner-garbage-provider-since-2019-2708e7c87a8a - webarchive
- https://research.checkpoint.com/2023/chain-reaction-rokrats-missing-link/ - webarchive
- https://embee-research.ghost.io/amadey-bot-infrastructure/ - webarchive
- https://twitter.com/ViriBack/status/1062405363457118210 - webarchive
- https://embee-research.ghost.io/redline-stealer-basic-static-analysis-and-c2-extraction/ - webarchive
- https://www.vmray.com/cyber-security-blog/amadey-new-encoding-with-old-tricks/ - webarchive
- https://info.spamhaus.com/hubfs/Botnet%20Reports/2023%20Q1%20Botnet%20Threat%20Update.pdf - webarchive
- https://g0njxa.medium.com/approaching-stealers-devs-a-brief-interview-with-amadey-56c8c6ea0ad6 - webarchive
- https://www.splunk.com/en_us/blog/security/amadey-threat-analysis-and-detections.html - webarchive
- https://www.zscaler.com/blogs/security-research/latest-version-amadey-introduces-screen-capturing-and-pushes-remcos-rat - webarchive
- https://blog.cyble.com/2023/01/25/the-rise-of-amadey-bot-a-growing-concern-for-internet-security/ - webarchive
- https://medium.com/walmartglobaltech/amadey-stealer-plugin-adds-mikrotik-and-outlook-harvesting-518efe724ce4 - webarchive
- https://embee-research.ghost.io/shodan-censys-queries/ - webarchive
- https://twitter.com/0xffff0800/status/1062948406266642432 - webarchive
- https://embeeresearch.io/redline-stealer-basic-static-analysis-and-c2-extraction/ - webarchive
- https://go.crowdstrike.com/rs/281-OBQ-266/images/Report2021GTR.pdf - webarchive
- https://bitsight.com/blog/unveiling-socks5systemz-rise-new-proxy-service-privateloader-and-amadey - webarchive
- https://www.bitsight.com/blog/unveiling-socks5systemz-rise-new-proxy-service-privateloader-and-amadey - webarchive
- https://www.cybereason.com/blog/the-hole-in-the-bucket-attackers-abuse-bitbucket-to-deliver-an-arsenal-of-malware - webarchive
- https://www.fsec.or.kr/common/proc/fsec/bbs/163/fileDownLoad/2297.do - webarchive
- https://asec.ahnlab.com/en/36634/ - webarchive
- https://www.rapid7.com/blog/post/2023/08/31/fake-update-utilizes-new-idat-loader-to-execute-stealc-and-lumma-infostealers/ - webarchive
- https://github.com/muha2xmad/Python/blob/bdc7a711d5a775f8ae47b591f20fdd2e1360b77b/Amadey/amadey_string_decryptor.py - webarchive
- https://www.linkedin.com/posts/idan-tarab-7a9057200_apt-ttps-coralraider-activity-7238998746254999553-57LG/ - webarchive
- https://www.team-cymru.com/post/seychelles-seychelles-on-the-c-2-shore - webarchive
- https://www.trellix.com/en-us/about/newsroom/stories/threat-labs/conti-leaks-examining-the-panama-papers-of-ransomware.html - webarchive
- https://www.telekom.com/en/blog/group/article/cybersecurity-ta505-s-box-of-chocolate-597672 - webarchive
- https://asec.ahnlab.com/en/41450/ - webarchive
- https://krabsonsecurity.com/2019/02/13/analyzing-amadey-a-simple-native-malware/ - webarchive
- https://maxkersten.nl/binary-analysis-course/analysis-scripts/ghidra-script-to-decrypt-strings-in-amadey-1-09/ - webarchive
- https://blogs.blackberry.com/en/2022/07/smokeloader-malware-used-to-augment-amadey-infostealer - webarchive
- https://embee-research.ghost.io/combining-pivot-points-to-identify-malware-infrastructure-redline-smokeloader-and-cobalt-strike/ - webarchive
- https://www.cert.ssi.gouv.fr/uploads/CERTFR-2020-CTI-006.pdf - webarchive
- https://isc.sans.edu/diary/27264 - webarchive
- https://asec.ahnlab.com/en/44504/ - webarchive
- https://asec.ahnlab.com/en/59590/ - webarchive
- https://www.ptsecurity.com/ww-en/analytics/pt-esc-threat-intelligence/paas-or-how-hackers-evade-antivirus-software/ - webarchive
- https://blogs.blackberry.com/en/2022/05/dot-net-stubs-sowing-the-seeds-of-discord - webarchive
- https://cocomelonc.github.io/tutorial/2022/04/20/malware-pers-1.html - webarchive
- https://nao-sec.org/2019/04/Analyzing-amadey.html - webarchive
- https://www.anquanke.com/post/id/230116 - webarchive
- https://blog.minerva-labs.com/underminer-exploit-kit-the-more-you-check-the-more-evasive-you-become - webarchive
- https://any.run/cybersecurity-blog/crackedcantil-breakdown/ - webarchive
- https://asec.ahnlab.com/en/40483/ - webarchive
- https://jsac.jpcert.or.jp/archive/2024/pdf/JSAC2024_1_1_kasuya_en.pdf - webarchive
- https://thecyberexpress.com/amadey-botnet-back-via-phishing-sites/ - webarchive
- https://blogs.blackberry.com/en/2020/01/threat-spotlight-amadey-bot - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
AMTsol
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular AMTsol.
Known Synonyms |
---|
Adupihan |
Internal MISP references
UUID ce25929c-0358-477c-a85e-f0bdfcc99a54
which can be used as unique global reference for AMTsol
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/win.amtsol - webarchive
- https://blogs.technet.microsoft.com/mmpc/2017/06/07/platinum-continues-to-evolve-find-ways-to-maintain-invisibility/ - webarchive
- http://download.microsoft.com/download/2/2/5/225BFE3E-E1DE-4F5B-A77B-71200928D209/Platinum%20feature%20article%20-%20Targeted%20attacks%20in%20South%20and%20Southeast%20Asia%20April%202016.pdf - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Anatova Ransomware
Anatova is a ransomware family with the goal of ciphering all the files that it can and then requesting payment from the victim. It will also check if network shares are connected and will encrypt the files on these shares too. The code is also prepared to support modular extensions.
Internal MISP references
UUID 2a28ad28-8ba5-4b8b-9652-bc0cdd37b2c4
which can be used as unique global reference for Anatova Ransomware
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/win.anatova_ransom - webarchive
- https://www.bleepingcomputer.com/news/security/new-anatova-ransomware-supports-modules-for-extra-functionality/ - webarchive
- https://securingtomorrow.mcafee.com/other-blogs/mcafee-labs/happy-new-year-2019-anatova-is-here/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Anchor
Anchor is a sophisticated backdoor served as a module to a subset of TrickBot installations. Operating since August 2018 it is not delivered to everybody, but contrary is delivered only to high-profile targets. Since its C2 communication scheme is very similar to the one implemented in the early TrickBot, multiple experts believe it could be attributed to the same authors.
Internal MISP references
UUID c38308a1-c89d-4835-b057-744f66ff7ddc
which can be used as unique global reference for Anchor
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/win.anchor - webarchive
- https://cocomelonc.github.io/tutorial/2022/05/09/malware-pers-4.html - webarchive
- https://thedfirreport.com/2021/03/08/bazar-drops-the-anchor/ - webarchive
- https://www.kryptoslogic.com/blog/2021/07/adjusting-the-anchor/ - webarchive
- https://cocomelonc.github.io/tutorial/2021/09/06/simple-malware-av-evasion-2.html - webarchive
- https://isc.sans.edu/diary/27308 - webarchive
- https://www.netscout.com/blog/asert/dropping-anchor - webarchive
- https://hello.global.ntt/zh-cn/insights/blog/trickbot-variant-communicating-over-dns - webarchive
- https://labs.sentinelone.com/deep-dive-into-trickbot-executor-module-mexec-hidden-anchor-bot-nexus-operations/ - webarchive
- https://go.crowdstrike.com/rs/281-OBQ-266/images/Report2021GTR.pdf - webarchive
- https://us-cert.cisa.gov/sites/default/files/publications/AA20-302A_Ransomware%20_Activity_Targeting_the_Healthcare_and_Public_Health_Sector.pdf - webarchive
- https://technical.nttsecurity.com/post/102fsp2/trickbot-variant-anchor-dns-communicating-over-dns - webarchive
- https://unit42.paloaltonetworks.com/ryuk-ransomware/ - webarchive
- https://go.crowdstrike.com/rs/281-OBQ-266/images/Report2020CrowdStrikeGlobalThreatReport.pdf - webarchive
- https://securityintelligence.com/posts/itg08-aka-fin6-partners-with-trickbot-gang-uses-anchor-framework/ - webarchive
- https://cybersecurity.att.com/blogs/labs-research/trickbot-bazarloader-in-depth - webarchive
- https://www.cybereason.com/blog/dropping-anchor-from-a-trickbot-infection-to-the-discovery-of-the-anchor-malware - webarchive
- https://medium.com/walmartglobaltech/anchor-and-lazarus-together-again-24744e516607 - webarchive
- https://www.bleepingcomputer.com/news/security/karakurt-revealed-as-data-extortion-arm-of-conti-cybercrime-syndicate/ - webarchive
- https://ti.qianxin.com/uploads/2020/02/13/cb78386a082f465f259b37dae5df4884.pdf - webarchive
- https://labs.sentinelone.com/the-deadly-planeswalker-how-the-trickbot-group-united-high-tech-crimeware-apt/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
AnchorMail
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular AnchorMail.
Known Synonyms |
---|
ANCHOR.MAIL |
Delegatz |
Internal MISP references
UUID 7792096a-7623-43a1-9a67-28dce0e4b39e
which can be used as unique global reference for AnchorMail
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/win.anchormail - webarchive
- https://blog.google/threat-analysis-group/initial-access-broker-repurposing-techniques-in-targeted-attacks-against-ukraine/ - webarchive
- https://securityintelligence.com/posts/new-malware-trickbot-anchordns-backdoor-upgrades-anchormail/ - webarchive
- https://securityintelligence.com/posts/trickbot-group-systematically-attacking-ukraine - webarchive
- https://cyware.com/news/trickbots-anchordns-is-now-upgraded-to-anchormail-a21f5490/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
AnchorMTea
Recon/Loader malware attributed to Lazarus, disguised as Notepad++ shell extension.
Internal MISP references
UUID 565de3f5-7eb7-43ca-a9d9-b588dfd6a50a
which can be used as unique global reference for AnchorMTea
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/win.anchormtea - webarchive
- https://cocomelonc.github.io/tutorial/2021/09/06/simple-malware-av-evasion-2.html - webarchive
- http://report.threatbook.cn/LS.pdf - webarchive
- https://cybergeeks.tech/a-detailed-analysis-of-lazarus-malware-disguised-as-notepad-shell-extension/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Andardoor
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Andardoor.
Known Synonyms |
---|
ROCKHATCH |
Internal MISP references
UUID 59a2437b-ae63-466a-9172-60d6610c3e19
which can be used as unique global reference for Andardoor
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Andromeda
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Andromeda.
Known Synonyms |
---|
B106-Gamarue |
B67-SS-Gamarue |
Gamarue |
b66 |
Internal MISP references
UUID 07f46d21-a5d4-4359-8873-18e30950df1a
which can be used as unique global reference for Andromeda
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/win.andromeda - webarchive
- https://www.europol.europa.eu/newsroom/news/andromeda-botnet-dismantled-in-international-cyber-operation - webarchive
- http://www.0xebfe.net/blog/2013/03/30/fooled-by-andromeda/ - webarchive
- http://blog.morphisec.com/andromeda-tactics-analyzed - webarchive
- https://blog.avast.com/andromeda-under-the-microscope - webarchive
- https://www.crowdstrike.com/blog/how-to-remediate-hidden-malware-real-time-response/ - webarchive
- https://www.virusbulletin.com/virusbulletin/2018/02/review-evolution-andromeda-over-years-we-say-goodbye/ - webarchive
- https://www.virusbulletin.com/virusbulletin/2013/08/andromeda-2-7-features - webarchive
- https://eternal-todo.com/blog/yet-another-andromeda-gamarue-analysis - webarchive
- https://byte-atlas.blogspot.ch/2015/04/kf-andromeda-bruteforcing.html - webarchive
- https://www.mandiant.com/resources/blog/turla-galaxy-opportunity - webarchive
- http://resources.infosecinstitute.com/andromeda-bot-analysis-part-two/ - webarchive
- https://www.cert.ssi.gouv.fr/uploads/CERTFR-2020-CTI-008.pdf - webarchive
- https://redcanary.com/blog/intelligence-insights-november-2021/ - webarchive
- https://eternal-todo.com/blog/andromeda-gamarue-loves-json - webarchive
- http://resources.infosecinstitute.com/andromeda-bot-analysis/ - webarchive
- https://www.shadowserver.org/news/has-the-sun-set-on-the-necurs-botnet/ - webarchive
- https://securelist.com/tomiris-called-they-want-their-turla-malware-back/109552/ - webarchive
- https://cert.ssi.gouv.fr/uploads/20220427_NP_TLPWHITE_ANSSI_FIN7.pdf - webarchive
- https://www.trellix.com/en-us/about/newsroom/stories/research/cyberattacks-targeting-ukraine-increase.html - webarchive
- https://www.proofpoint.com/sites/default/files/proofpoint-operation-transparent-tribe-threat-insight-en.pdf - webarchive
- https://resource.redcanary.com/rs/003-YRU-314/images/2021-Threat-Detection-Report.pdf - webarchive
- https://blogs.technet.microsoft.com/mmpc/2017/12/04/microsoft-teams-up-with-law-enforcement-and-other-partners-to-disrupt-gamarue-andromeda/ - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
AndroMut
According to Proofpoint, AndroMut is a new downloader malware written in C++ that Proofpoint researchers began observing in the wild in June 2019. The “Andro” part of the name comes from some of the pieces which bear resemblance to another downloader malware known as Andromeda [1] and “Mut” is based off a mutex that the analyzed sample creates: “mutshellmy777”.
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular AndroMut.
Known Synonyms |
---|
Gelup |
Internal MISP references
UUID 85673cd4-fb05-4f6d-94ec-71290ae2e422
which can be used as unique global reference for AndroMut
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/win.andromut - webarchive
- https://blog.intel471.com/2020/05/21/a-brief-history-of-ta505/ - webarchive
- https://intel471.com/blog/a-brief-history-of-ta505 - webarchive
- https://documents.trendmicro.com/assets/Tech-Brief-Latest-Spam-Campaigns-from-TA505-Now-Using-New-Malware-Tools-Gelup-and-FlowerPippi.pdf - webarchive
- https://www.cert.ssi.gouv.fr/uploads/CERTFR-2020-CTI-006.pdf - webarchive
- https://www.proofpoint.com/us/threat-insight/post/ta505-begins-summer-campaigns-new-pet-malware-downloader-andromut-uae-south - webarchive
- https://www.pwc.co.uk/cyber-security/assets/cyber-threats-2019-retrospect.pdf - webarchive
- https://outpost24.com/blog/using-qiling-framework-to-unpack-ta505-packed-samples/ - webarchive
- https://www.blueliv.com/cyber-security-and-cyber-threat-intelligence-blog-blueliv/using-qiling-framework-to-unpack-ta505-packed-samples/ - webarchive
- https://www.ptsecurity.com/ww-en/analytics/pt-esc-threat-intelligence/operation-ta505-part3/ - webarchive
- https://www.cert.ssi.gouv.fr/uploads/CERTFR-2020-CTI-009.pdf - webarchive
- https://ti.qianxin.com/uploads/2020/02/13/cb78386a082f465f259b37dae5df4884.pdf - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Anel
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Anel.
Known Synonyms |
---|
UPPERCUT |
lena |
Internal MISP references
UUID a180afcc-d42d-4600-b70f-af27aaf851b7
which can be used as unique global reference for Anel
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/win.anel - webarchive
- https://jsac.jpcert.or.jp/archive/2024/pdf/JSAC2024_2_7_hara_shoji_higashi_vickie-su_nick-dai_en.pdf - webarchive
- https://www.macnica.net/file/mpressioncss_2018-1h-report_mnc_rev3_nopw.pdf - webarchive
- https://blog.trendmicro.com/trendlabs-security-intelligence/chessmaster-adds-updated-tools-to-its-arsenal/ - webarchive
- https://www.macnica.net/file/mpressioncss_ta_report_2019.pdf - webarchive
- https://www.secureworks.com/research/threat-profiles/bronze-riverside - webarchive
- https://www.virusbulletin.com/uploads/pdf/conference_slides/2019/VB2019-Haruyama.pdf - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
AnteFrigus
Ransomware that demands payment in Bitcoin.
Internal MISP references
UUID 04788457-5b72-4a66-8f2c-73497919ece2
which can be used as unique global reference for AnteFrigus
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Antilam
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Antilam.
Known Synonyms |
---|
Latinus |
Internal MISP references
UUID 02be7f3a-f3bf-447b-b8b4-c78432b82694
which can be used as unique global reference for Antilam
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Anubis (Windows)
According to Microsoft Security Intelligence, Anubis is an information stealer sold on underground forums since June 2020. The name overlaps with the Android banking malware but is unrelated. It contains code forked from Loki PWS.
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Anubis (Windows).
Known Synonyms |
---|
Anubis Stealer |
Internal MISP references
UUID b19c9f63-a18d-47bb-a9fe-1f9cea21bac0
which can be used as unique global reference for Anubis (Windows)
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/win.anubis - webarchive
- https://cybleinc.com/2021/05/02/mobile-malware-app-anubis-strikes-again-continues-to-lure-users-disguised-as-a-fake-antivirus/ - webarchive
- https://twitter.com/MsftSecIntel/status/1298752223321546754 - webarchive
- https://therecord.media/russian-hacker-pavel-sitnikov-arrested-for-sharing-malware-source-code/ - webarchive
- https://medium.com/csis-techblog/inside-view-of-brazzzersff-infrastructure-89b9188fd145 - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Anubis Loader
A loader written in Go, tracked since at least October 2021 by ZeroFox. Originally named Kraken and rebranded to Anubis in February 2022.
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Anubis Loader.
Known Synonyms |
---|
Kraken |
Pepega |
Internal MISP references
UUID e65ca164-f448-4f8e-a672-3ff7ec37e191
which can be used as unique global reference for Anubis Loader
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/win.anubis_loader - webarchive
- https://www.zerofox.com/blog/quick-update-kraken-completes-its-rebrand-to-anubis/ - webarchive
- https://www.zerofox.com/blog/meet-kraken-a-new-golang-botnet-in-development/ - webarchive
- https://windowsreport.com/kraken-botnet/ - webarchive
- https://www.bleepingcomputer.com/news/security/new-golang-botnet-empties-windows-users-cryptocurrency-wallets/ - webarchive
- https://medium.com/walmartglobaltech/privateloader-to-anubis-loader-55d066a2653e - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
APERETIF
Internal MISP references
UUID 573eb306-f6c7-4ba9-91a9-881473d335b8
which can be used as unique global reference for APERETIF
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Apocalipto
Internal MISP references
UUID d3e16d46-e436-4757-b962-6fd393056415
which can be used as unique global reference for Apocalipto
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Apocalypse
Internal MISP references
UUID e87d9df4-b464-4458-ae1f-31cea40d5f96
which can be used as unique global reference for Apocalypse
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Apollo
This is an implant usable with the Mythic C2 framework. Apollo is a Windows agent written in C# using the 4.0 .NET Framework designed to be used in SpecterOps training offerings.
Internal MISP references
UUID f995662c-27ad-440b-97ce-f1ecd2b59221
which can be used as unique global reference for Apollo
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Apostle
Malware used by suspected Iranian threat actor Agrius, turned from wiper into ransomware.
Internal MISP references
UUID cb2d3a6f-8ff5-4b08-af95-7377cfe3f7c3
which can be used as unique global reference for Apostle
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/win.apostle - webarchive
- https://www.crowdstrike.com/blog/the-anatomy-of-wiper-malware-part-1/ - webarchive
- https://www.welivesecurity.com/2022/12/07/fantasy-new-agrius-wiper-supply-chain-attack/ - webarchive
- https://www.sentinelone.com/wp-content/uploads/2021/05/SentinelLabs_From-Wiper-to-Ransomware-The-Evolution-of-Agrius.pdf - webarchive
- https://cyberpunkleigh.wordpress.com/2021/05/27/apostle-ransomware-analysis/ - webarchive
- https://www.sentinelone.com/labs/new-version-of-apostle-ransomware-reemerges-in-targeted-attack-on-higher-education/ - webarchive
- https://assets.sentinelone.com/sentinellabs/evol-agrius - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
AppleJeus (Windows)
Internal MISP references
UUID 2b655949-8a17-46e5-9522-519c6d77c45f
which can be used as unique global reference for AppleJeus (Windows)
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/win.applejeus - webarchive
- https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/lazarus-north-korea-indictment - webarchive
- https://cocomelonc.github.io/tutorial/2022/05/09/malware-pers-4.html - webarchive
- https://blog.sekoia.io/the-dprk-delicate-sound-of-cyber/ - webarchive
- https://us-cert.cisa.gov/ncas/analysis-reports/ar21-048b - webarchive
- https://us-cert.cisa.gov/ncas/analysis-reports/ar21-048a - webarchive
- https://us-cert.cisa.gov/ncas/analysis-reports/ar21-048e - webarchive
- https://us-cert.cisa.gov/ncas/analysis-reports/ar21-048g - webarchive
- https://us-cert.cisa.gov/ncas/analysis-reports/ar21-048d - webarchive
- https://www.telsy.com/download/5394/?uid=28b0a4577e - webarchive
- https://www.vkremez.com/2019/10/lets-learn-dissecting-lazarus-windows.html - webarchive
- https://us-cert.cisa.gov/ncas/alerts/aa21-048a - webarchive
- https://us-cert.cisa.gov/ncas/analysis-reports/ar21-048c - webarchive
- https://vblocalhost.com/uploads/VB2021-Park.pdf - webarchive
- https://ti.qianxin.com/uploads/2020/02/13/cb78386a082f465f259b37dae5df4884.pdf - webarchive
- https://mandiant.widen.net/s/pkffwrbjlz/m-trends-2023 - webarchive
- https://twitter.com/VK_Intel/status/1182730637016481793 - webarchive
- https://us-cert.cisa.gov/ncas/analysis-reports/ar21-048f - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Appleseed
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Appleseed.
Known Synonyms |
---|
JamBog |
Internal MISP references
UUID c7f8e3b8-328d-43c3-9235-9a2f704389b4
which can be used as unique global reference for Appleseed
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/win.appleseed - webarchive
- https://asec.ahnlab.com/en/30532/ - webarchive
- https://i.blackhat.com/asia-21/Friday-Handouts/as-21-Kuo-We-Are-About-To-Land-How-CloudDragon-Turns-A-Nightmare-Into-Reality.pdf - webarchive
- https://conference.hitb.org/hitbsecconf2021ams/materials/D2T1%20-%20The%20Phishermen%20-%20Dissecting%20Phishing%20Techniques%20of%20CloudDragon%20APT%20-%20Linda%20Kuo%20&Zih-Cing%20Liao%20.pdf - webarchive
- https://asec.ahnlab.com/ko/26705/ - webarchive
- https://asec.ahnlab.com/en/36368/ - webarchive
- https://www.youtube.com/watch?v=Dv2_DK3tRgI - webarchive
- https://www.boho.or.kr/filedownload.do?attach_file_seq=2651&attach_file_id=EpF2651.pdf - webarchive
- https://blog.malwarebytes.com/threat-analysis/2021/06/kimsuky-apt-continues-to-target-south-korean-government-using-appleseed-backdoor/ - webarchive
- https://www.boho.or.kr/filedownload.do?attach_file_seq=2651&attach_file_id=EpF2652.pdf - webarchive
- https://asec.ahnlab.com/ko/36918/ - webarchive
- https://download.ahnlab.com/global/brochure/Analysis%20Report%20of%20Kimsuky%20Group.pdf - webarchive
- https://asec.ahnlab.com/en/59590/ - webarchive
- https://asec.ahnlab.com/en/41015/ - webarchive
- https://www.youtube.com/watch?v=rfzmHjZX70s - webarchive
- https://www.telsy.com/download/5654/?uid=4869868efd - webarchive
- https://medium.com/s2wblog/kimsuky-disguised-as-a-korean-company-signed-with-a-valid-certificate-to-distribute-troll-stealer-cfa5d54314e2 - webarchive
- https://asec.ahnlab.com/ko/54804/ - webarchive
- https://www.boho.or.kr/filedownload.do?attach_file_seq=2652&attach_file_id=EpF2652.pdf - webarchive
- https://vblocalhost.com/presentations/operation-newton-hi-kimsuky-did-an-appleseed-really-fall-on-newtons-head/ - webarchive
- https://asec.ahnlab.com/en/60054/ - webarchive
- https://asec.ahnlab.com/wp-content/uploads/2021/11/Kimsuky-%EA%B7%B8%EB%A3%B9%EC%9D%98-APT-%EA%B3%B5%EA%B2%A9-%EB%B6%84%EC%84%9D-%EB%B3%B4%EA%B3%A0%EC%84%9C-AppleSeed-PebbleDash.pdf - webarchive
- https://www.pwc.co.uk/cyber-security/pdf/pwc-cyber-threats-2020-a-year-in-retrospect.pdf - webarchive
Associated metadata
Metadata key | Value |
---|---|
type | [] |
ArdaMax
According to f-secure, Ardamax is a commercial keylogger program that can be installed onto the system from the product's website.& When run, the program can capture a range of user activities, such as keystrokes typed, instant messenger chat logs, web browser activity and even screenshots of the active desktop.
This program can be configured to a complete stealth mode, with password protection, to avoid user detection.
The information gathered is stored in an encrypted log file, which is only viewable using the built-in Log Viewer. The log file can be sent to an external party through e-mail, via a local area network (LAN) or by upload to an FTP server (in either HTML or encrypted format).
Internal MISP references
UUID 4f5c2f8b-06ef-4fb3-b03c-afdcafa88de5
which can be used as unique global reference for ArdaMax
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Arefty
Internal MISP references
UUID bf135b0a-3120-42c4-ba58-c80f9ef689bf
which can be used as unique global reference for Arefty
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
Ares (Windows)
A banking trojan, derived from the source code of win.kronos. In August 2022 it started to incorporate DGA code from win.qakbot.
Internal MISP references
UUID a711ad02-0120-41a1-8c03-8a857a7dc297
which can be used as unique global reference for Ares (Windows)
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
type | [] |
AresLoader
AresLoader is a new malware "downloader" that has been advertised on some Russian language Dark Web forums “RAMP and "XSS" by a threat actor called "DarkBLUP". Researchers assess this loader is likely a legitimate penetration testing tool that is now being abused by threat actors. This is because of a similar project, dubbed “Project Ares,” was previously uploaded to GitHub as a proof-of-concept (PoC) by the well-regarded user and red teamer “CerberSec.”
The loader mimics legitimate software to trick victims into executing malware with administrator rights on their machines. Additional features of the loader include:
- Written in C/C++
- Supports 64-bit payloads
- Makes it look like malware spawned by another process
- Prevents non-Microsoft signed binaries from being injected into malware
- Hides suspicious imported Windows APIs
- Leverages anti-analysis techniques to avoid reverse engineering
Furthermore, It was observed that SystemBC, Amadey, and several Raccoon Stealers were directly installing AresLoader. To date, the AresLoader downloader has been seen delivering payloads like SystemBC, Lumma Stealer, StealC, Aurora Stealer, and Laplas Clipper.
Internal MISP references
UUID 1bd6c2ab-341e-43e1-90ca-2e7509828268
which can be used as unique global reference for AresLoader
in MISP communities and other software using the MISP galaxy
External references
- https://malpedia.caad.fkie.fraunhofer.de/details/win.aresloader - webarchive
- https://www.zerofox.com/blog/the-underground-economist-volume-2-issue-24/ - webarchive
- https://research.openanalysis.net/ares/aresloader/loader/2023/04/02/aresloader.html - webarchive
- https://flashpoint.io/blog/private-malware-for-sale-aresloader/ - webarchive
- https://twitter.com/k3dg3/status/1636873721200746496 - webarchive
- https://intel471.com/blog/new-loader-on-the-bloc-aresloader -