Names | Crutch | |
Category | Malware | |
Type | Reconnaissance, Backdoor, Exfiltration | |
Description | (ESET) We were able to capture some of the commands sent by the operators to several Crutch v3 instances, which is helpful to understand the goal of the operation. The operators were mainly doing reconnaissance, lateral movement and espionage. The main malicious activity is the staging, compression and exfiltration of documents and various files, as shown in Figure 1. These are commands manually executed by the operators, thus not showing the automated collection of documents by the drive monitor component described in a later section. | |
Information | <https://www.welivesecurity.com/2020/12/02/turla-crutch-keeping-back-door-open/> | |
MITRE ATT&CK | <https://attack.mitre.org/software/S0538/> | |
Malpedia | <https://malpedia.caad.fkie.fraunhofer.de/details/win.crutch> |
Last change to this tool card: 30 December 2022
Download this tool card in JSON format
Previous: CroxLoader
Next: Crypta
Changed | Name | Country | Observed | ||
APT groups | |||||
Turla, Waterbug, Venomous Bear | 1996-Dec 2023 |
1 group listed (1 APT, 0 other, 0 unknown)
Digital Service Security Center Follow us on |
Report incidents |
|
+66 (0)2-123-1227 | ||
[email protected] |