Names | Crutch | |
Category | Malware | |
Type | Reconnaissance, Backdoor, Exfiltration | |
Description | (ESET) We were able to capture some of the commands sent by the operators to several Crutch v3 instances, which is helpful to understand the goal of the operation. The operators were mainly doing reconnaissance, lateral movement and espionage. The main malicious activity is the staging, compression and exfiltration of documents and various files, as shown in Figure 1. These are commands manually executed by the operators, thus not showing the automated collection of documents by the drive monitor component described in a later section. | |
Information | <https://www.welivesecurity.com/2020/12/02/turla-crutch-keeping-back-door-open/> | |
Malpedia | <https://malpedia.caad.fkie.fraunhofer.de/details/win.crutch> |
Last change to this tool card: 24 April 2021
Download this tool card in JSON format
Changed | Name | Country | Observed | ||
APT groups | |||||
Turla, Waterbug, Venomous Bear | ![]() | 1996-Apr 2022 ![]() |
1 group listed (1 APT, 0 other, 0 unknown)
Digital Service Security Center Follow us on![]() ![]() |
Report incidents |
|
![]() |
+66 (0)2-123-1227 | |
![]() |
[email protected] |