Names | GpUpdates.exe | |
Category | Malware | |
Type | Dropper | |
Description | (Epic Turla) The droppers are misidentified as packed by Armadillo but in reality they’re built using now defunct Chilkat software, ‘Zip2Secure’ to create self-extracting executables. The packing alone has led the droppers to be detected under generic AV detections but the subcomponents have low-to-no detections at this time. The Zip2Secure configuration entrusts the distribution of the files contained therein to ‘Distribute.exe’, which places the files and silently registers the subcomponents with regsvr32.exe. | |
Information | <https://www.epicturla.com/blog/the-lost-nazar> |
Last change to this tool card: 24 April 2020
Download this tool card in JSON format
Previous: gpresult
Next: Grandoreiro
Changed | Name | Country | Observed | ||
APT groups | |||||
Nazar | 2008 |
1 group listed (1 APT, 0 other, 0 unknown)
Digital Service Security Center Follow us on |
Report incidents |
|
+66 (0)2-123-1227 | ||
[email protected] |