ETDA สำนักงานพัฒนาธุรกรรมทางอิเล็กทรอนิกส์
Electronic Transactions Development Agency
Report
Search
Home > List all groups > List all tools > List all groups using tool Komplex

Threat Group Cards: A Threat Actor Encyclopedia

Permanent link Tool: Komplex

NamesKomplex
CategoryMalware
TypeReconnaissance, Banking trojan, Backdoor, Info stealer, Dropper, Downloader
Description(Palo Alto) The Sofacy group created the Komplex Trojan to use in attack campaigns targeting the OS X operating system – a move that showcases their continued evolution toward multi-platform attacks. The tool is capable of downloading additional files to the system, executing and deleting files, as well as directly interacting with the system shell. While detailed targeting information is not currently available, we believe Komplex has been used in attacks on individuals related to the aerospace industry, as well as attacks leveraging an exploit in MacKeeper to deliver the Trojan. The Komplex Trojan revealed a design similar to Sofacy’s JHUHUGIT variant Trojan, which we believe may have been done in order to handle compromised Windows and OS X systems using the same C2 server application with relative ease.
Information<https://unit42.paloaltonetworks.com/unit42-sofacys-komplex-os-x-trojan/>
<https://blog.malwarebytes.com/threat-analysis/2016/09/komplex-mac-backdoor-answers-old-questions/>
MITRE ATT&CK<https://attack.mitre.org/software/S0162/>
Malpedia<https://malpedia.caad.fkie.fraunhofer.de/details/osx.komplex>
AlienVault OTX<https://otx.alienvault.com/browse/pulses?q=tag:komplex>

Last change to this tool card: 13 May 2020

Download this tool card in JSON format

Previous: KOCTOPUS
Next: KOMPROGO

All groups using tool Komplex

ChangedNameCountryObserved

APT groups

XSofacy, APT 28, Fancy Bear, SednitRussia2004-Sep 2024 HOTX

1 group listed (1 APT, 0 other, 0 unknown)

Digital Service Security Center
Electronic Transactions Development Agency

Follow us on

Facebook Twitter

Report incidents

Telephone +66 (0)2-123-1227
E-mail [email protected]