Names | MSUpdater | |
Category | Malware | |
Type | Dropper, Backdoor, Info stealer, Exfiltration | |
Description | (ZScaler) The malware dropped and launched from the PDF exploit has been seen to be virtual machine (VM) aware in order to prevent analysis within a sandbox. The Trojan functionality is decrypted at run-time, and includes expected functionality, such as, downloading, uploading, and executing files driven by commands from the C&C. Communication with the C&C is over HTTP but is encoded to evade detection. The Trojan file name (e.g., 'msupdate.exe') and the HTTP paths used in the C&C (e.g., '/microsoftupdate/getupdate/default.aspx') are used to stay under the radar by appearing to be related to Microsoft Windows Update - hence the name given to this Trojan. | |
Information | <https://www.zscaler.com/blogs/research/msupdater-trojan-and-link-targeted-attacks> <https://cybersecurity.att.com/blogs/labs-research/msupdater-trojan-found-using-cve-2012-0158-space-and-missile-defense-conference> | |
AlienVault OTX | <https://otx.alienvault.com/browse/pulses?q=tag:msupdater> |
Last change to this tool card: 20 April 2020
Download this tool card in JSON format
Previous: MSFvenom
Next: msvcrt58.sqt
Changed | Name | Country | Observed | ||
APT groups | |||||
Putter Panda, APT 2 | 2007 |
1 group listed (1 APT, 0 other, 0 unknown)
Digital Service Security Center Follow us on |
Report incidents |
|
+66 (0)2-123-1227 | ||
[email protected] |