Names | Scout | |
Category | Malware | |
Type | Downloader | |
Description | (AhnLab) In 2022, a downloader began being detected. This is similar to Volgmer, but instead of having backdoor features, it is a downloader that downloads another malware from an external source and executes it in the memory area. While the downloaded payload could not be procured, there are three notable points about it. First is that it is being detected after the end of Volgmer’s active period. The second is that its communication method with the C&C server and loading of the configuration data are the same as Volgmer. Lastly, it also has records of being created by a similar dropper. | |
Information | <https://asec.ahnlab.com/en/57685/> | |
Malpedia | <https://malpedia.caad.fkie.fraunhofer.de/details/win.scout> |
Last change to this tool card: 17 January 2024
Download this tool card in JSON format
Previous: Scote
Next: SCRAPMINT
Changed | Name | Country | Observed | ||
APT groups | |||||
Lazarus Group, Hidden Cobra, Labyrinth Chollima | 2007-Sep 2024 |
1 group listed (1 APT, 0 other, 0 unknown)
Digital Service Security Center Follow us on |
Report incidents |
|
+66 (0)2-123-1227 | ||
[email protected] |