ETDA สำนักงานพัฒนาธุรกรรมทางอิเล็กทรอนิกส์
Electronic Transactions Development Agency
Report
Search
Home > List all groups > List all tools > List all groups using tool BarbWire

Threat Group Cards: A Threat Actor Encyclopedia

Permanent link Tool: BarbWire

NamesBarbWire
CategoryMalware
TypeReconnaissance, Backdoor, Info stealer, Credential stealer, Keylogger, Downloader, Exfiltration
Description(Cybereason) The backdoor component of APT-C-23’s operation is a very capable piece of malware, and it is obvious that a lot of effort was put into hiding its capabilities using a custom base64 algorithm. Its main goal is to fully compromise the victim machine, gaining access to their most sensitive data. The backdoor’s main capabilities include:
• Persistence
• OS Reconnaissance
• Data encryption
• Keylogging
• Screen capturing
• Audio recording
• Download additional malware
• Local/external drives and directory enumeration
• Steal specific file types and exfiltrate data
Information<https://www.cybereason.com/blog/operation-bearded-barbie-apt-c-23-campaign-targeting-israeli-officials>
Malpedia<https://malpedia.caad.fkie.fraunhofer.de/details/win.barbwire>

Last change to this tool card: 27 December 2022

Download this tool card in JSON format

All groups using tool BarbWire

ChangedNameCountryObserved

APT groups

 Desert Falcons[Gaza]2011-Oct 2023X

1 group listed (1 APT, 0 other, 0 unknown)

Digital Service Security Center
Electronic Transactions Development Agency

Follow us on

Facebook Twitter

Report incidents

Telephone +66 (0)2-123-1227
E-mail [email protected]