ETDA สำนักงานพัฒนาธุรกรรมทางอิเล็กทรอนิกส์
Electronic Transactions Development Agency
Report
Search
Home > List all groups > List all tools > List all groups using tool Crutch

Threat Group Cards: A Threat Actor Encyclopedia

Permanent link Tool: Crutch

NamesCrutch
CategoryMalware
TypeReconnaissance, Backdoor, Exfiltration
Description(ESET) We were able to capture some of the commands sent by the operators to several Crutch v3 instances, which is helpful to understand the goal of the operation. The operators were mainly doing reconnaissance, lateral movement and espionage.
The main malicious activity is the staging, compression and exfiltration of documents and various files, as shown in Figure 1. These are commands manually executed by the operators, thus not showing the automated collection of documents by the drive monitor component described in a later section.
Information<https://www.welivesecurity.com/2020/12/02/turla-crutch-keeping-back-door-open/>
MITRE ATT&CK<https://attack.mitre.org/software/S0538/>
Malpedia<https://malpedia.caad.fkie.fraunhofer.de/details/win.crutch>

Last change to this tool card: 30 December 2022

Download this tool card in JSON format

All groups using tool Crutch

ChangedNameCountryObserved

APT groups

 Turla, Waterbug, Venomous BearRussia1996-Dec 2023 

1 group listed (1 APT, 0 other, 0 unknown)

Digital Service Security Center
Electronic Transactions Development Agency

Follow us on

Facebook Twitter

Report incidents

Telephone +66 (0)2-123-1227
E-mail [email protected]