Names | Tcp_transfer | |
Category | Malware | |
Type | Tunneling | |
Description | (Bitdefender) The executable binds to “0.0.0.0:8080’ address and starts listening for local connection. For each incoming connection on the local address, it creates a new connection to the C&C and start receiving and sending the data. The goal of such tool is to bypass network restriction such that the compromised machines that are not connected directly to the internet can communicate with the C&C through another compromised machine that has an internet connection. | |
Information | <https://www.bitdefender.com/files/News/CaseStudies/study/379/Bitdefender-Whitepaper-Chinese-APT.pdf> |
Last change to this tool card: 06 January 2021
Download this tool card in JSON format
Previous: TCP Port Scanner
Next: Tdrop
Changed | Name | Country | Observed | ||
APT groups | |||||
FunnyDream | 2018 |
1 group listed (1 APT, 0 other, 0 unknown)
Digital Service Security Center Follow us on |
Report incidents |
|
+66 (0)2-123-1227 | ||
[email protected] |