ETDA สำนักงานพัฒนาธุรกรรมทางอิเล็กทรอนิกส์
Electronic Transactions Development Agency
Report
Search
Home > List all groups > List all tools > List all groups using tool VELVETSTING

Threat Group Cards: A Threat Actor Encyclopedia

Permanent link Tool: VELVETSTING

NamesVELVETSTING
CategoryMalware
TypeBackdoor
Description(Sygnia) A tool that connects to the threat actor’s C&C once an hour, searching commands to execute. The threat actor used the IP address 202.61.136[.]158:8443 as a C&C and the commands were encoded with the passphrase ‘1qaz@WSXedc’. Once the tool received a command, it was executed via ‘csh’ (Unix C shell).
Information<https://www.sygnia.co/blog/china-nexus-threat-group-velvet-ant/>

Last change to this tool card: 19 June 2024

Download this tool card in JSON format

Previous: VeilShell
Next: VELVETTAP

All groups using tool VELVETSTING

ChangedNameCountryObserved

APT groups

 Velvet AntChina2023-Jul 2024 

1 group listed (1 APT, 0 other, 0 unknown)

Digital Service Security Center
Electronic Transactions Development Agency

Follow us on

Facebook Twitter

Report incidents

Telephone +66 (0)2-123-1227
E-mail [email protected]