
| Names | Salgorea BadCake | |
| Category | Malware | |
| Type | Reconnaissance, Backdoor | |
| Description | (Accenture) This backdoor is commonly dropped by either an SFX or an exploit document (e.g. Microsoft Corp. Word or PDF file). Some of this backdoor’s observed capabilities include: • Arbitrary file, process and registration creation • Fingerprinting the local machine • Running arbitrary shellcode Once dropped, it is usually divided into multiple components in order to be side-loaded, in a fashion similar to other remote access tools including PlugX and NetTraveler. | |
| Information | <https://www.accenture.com/us-en/blogs/blogs-pond-loach-delivers-badcake-malware> | |
| Malpedia | <https://malpedia.caad.fkie.fraunhofer.de/details/win.salgorea> | |
Last change to this tool card: 23 April 2020
Download this tool card in JSON format
Previous: Sakula RAT
Next: Sality
| Changed | Name | Country | Observed | ||
APT groups | |||||
| APT 32, OceanLotus, SeaLotus | 2013-Aug 2024 | ![]() | |||
1 group listed (1 APT, 0 other, 0 unknown)
|
Digital Service Security Center Follow us on |
Report incidents |
|
| +66 (0)2-123-1227 | ||
| [email protected] | ||