Skip to content

<<< Hide Navigation Hide TOC >>>

COMpfun (b2c2d42b-a6a3-4ab0-a013-eb1c7461aca9)

The COMpfun malware was initially documented by G-DATA in 2014. Although G-DATA didn’t identify which actor was using this malware, Kaspersky tentatively linked it to the Turla APT, based on the victimology. Our telemetry indicates that the current campaign using Reductor started at the end of April 2019 and remained active at the time of writing (August 2019). We identified targets in Russia and Belarus.

Galaxy ColorsMalpediaTool
Rows: 1
Loading extensions...
Collapse filters
Use the filters above each column to filter and limit table data. Advanced searches can be performed by using the following operators:
<, <=, >, >=, =, *, !, {, }, ||,&&, [empty], [nonempty], rgx:
Learn more

TableFilter v0.7.2

https://www.tablefilter.com/
©2015-2025 Max Guglielmi
?
Cluster A Galaxy A Cluster B Galaxy B Level
COMpfun (541d5642-0648-4b5a-97b9-81110f273771) Malpedia COMpfun (b2c2d42b-a6a3-4ab0-a013-eb1c7461aca9) Tool 1