Rurktar (40bce827-4049-46e4-8323-3ab58f0f00bc)
Dubbed Rurktar, the tool hasn’t had all of its functionality implemented yet, but G DATA says “it is relatively safe to say [it] is intended for use in targeted spying operations.” The malicious program could be used for reconnaissance operations, as well as to spy on infected computers users, and steal or upload files.
Cluster A | Galaxy A | Cluster B | Galaxy B | Level |
---|---|---|---|---|
Rurktar (40bce827-4049-46e4-8323-3ab58f0f00bc) | RAT | Rurktar (512e0b13-a52b-45ef-9230-7172f5e976d4) | Malpedia | 1 |