Names | POORAIM Backdoor.APT.POORAIM | |
Category | Malware | |
Type | Reconnaissance, Backdoor, Info stealer, Exfiltration | |
Description | (FireEye) POORAIM malware is designed with basic backdoor functionality and leverages AOL Instant Messenger for command and control communications. POORAIM includes the following capabilities: System information enumeration, File browsing, manipulation and exfiltration, Process enumeration, Screen capture, File execution, Exfiltration of browser favorites, and battery status. Exfiltrated data is sent via files over AIM. POORAIM has been involved in campaigns against South Korean media organizations and sites relating to North Korean refugees and defectors since early 2014. Compromised sites have acted as watering holes to deliver newer variants of POORAIM. | |
Information | <https://www2.fireeye.com/rs/848-DID-242/images/rpt_APT37.pdf> | |
MITRE ATT&CK | <https://attack.mitre.org/software/S0216/> |
Last change to this tool card: 22 April 2020
Download this tool card in JSON format
Previous: POOLRAT
Next: POPFLASH
Changed | Name | Country | Observed | ||
APT groups | |||||
Reaper, APT 37, Ricochet Chollima, ScarCruft | 2012-Sep 2024 |
1 group listed (1 APT, 0 other, 0 unknown)
Digital Service Security Center Follow us on |
Report incidents |
|
+66 (0)2-123-1227 | ||
[email protected] |