ETDA สำนักงานพัฒนาธุรกรรมทางอิเล็กทรอนิกส์
Electronic Transactions Development Agency
Report
Search
Home > List all groups > List all tools > List all groups using tool XSLCmd

Threat Group Cards: A Threat Actor Encyclopedia

Permanent link Tool: XSLCmd

NamesXSLCmd
CategoryMalware
TypeBackdoor, Keylogger, Info stealer
Description(FireEye) The backdoor code was ported to OS X from a Windows backdoor that has been used extensively in targeted attacks over the past several years, having been updated many times in the process. Its capabilities include a reverse shell, file listings and transfers, installation of additional executables, and an updatable configuration. The OS X version of XSLCmd includes two additional features not found in the Windows variants we have studied in depth: key logging and screen capturing.
Information<https://www.fireeye.com/blog/threat-research/2014/09/forced-to-adapt-xslcmd-backdoor-now-on-os-x.html>
<https://objective-see.com/blog/blog_0x16.html>
Malpedia<https://malpedia.caad.fkie.fraunhofer.de/details/osx.xslcmd>
AlienVault OTX<https://otx.alienvault.com/browse/pulses?q=tag:xslcmd>

Last change to this tool card: 02 July 2020

Download this tool card in JSON format

Previous: XServer
Next: xsPlus

All groups using tool XSLCmd

ChangedNameCountryObserved

APT groups

 Ke3chang, Vixen Panda, APT 15, GREF, Playful DragonChina2010-Late 2022 

1 group listed (1 APT, 0 other, 0 unknown)

Digital Service Security Center
Electronic Transactions Development Agency

Follow us on

Facebook Twitter

Report incidents

Telephone +66 (0)2-123-1227
E-mail [email protected]