Names | Powerkatz | |
Category | Malware | |
Type | Loader | |
Description | (Yoroi) As intended by its name, it is able to start a new asynchronous task on the victim’s machine, executing the task object passed as _app parameter. Once the task is started, the function waits its completion using repeated 1-sec sleeps cycle, and then it returns a valid code status to the function caller. Probably this module can be used in conjunction with some other functions, belonging to other pieces of the implant, to perform malicious actions in background, making all more stealth. Note: not the same software as an open source project on GitHub. | |
Information | <https://yoroi.company/research/the-arsenal-behind-the-australian-parliament-hack/> | |
Malpedia | <https://malpedia.caad.fkie.fraunhofer.de/details/win.powerkatz> |
Last change to this tool card: 23 April 2020
Download this tool card in JSON format
Previous: PowerExchange
Next: PowerLess Backdoor
Changed | Name | Country | Observed | ||
APT groups | |||||
Iridium | 2018-Dec 2018 |
1 group listed (1 APT, 0 other, 0 unknown)
Digital Service Security Center Follow us on |
Report incidents |
|
+66 (0)2-123-1227 | ||
[email protected] |