ETDA สำนักงานพัฒนาธุรกรรมทางอิเล็กทรอนิกส์
Electronic Transactions Development Agency
Report
Search
Home > List all groups > List all tools > List all groups using tool Godzilla

Threat Group Cards: A Threat Actor Encyclopedia

Permanent link Tool: Godzilla

NamesGodzilla
Godzilla Loader
CategoryMalware
TypeDownloader, Worm, Botnet
Description(Check Point) Enter Godzilla Loader, a malware being advertised on Dark Web forums, and being actively developed right now. Godzilla fills the “downloader” or “dropper” niche, offering a level of indirection such that the binary that first runs on the victim machine does not contain any of the actual payload, and instead downloads the payload from a remote server. Godzilla is actively maintained, with new features being added periodically, and retails for $500, around a quarter of the asking price of its better-established competitor, Emotet.
Information<https://research.checkpoint.com/2018/godzilla-loader-and-the-long-tail-of-malware/>
Malpedia<https://malpedia.caad.fkie.fraunhofer.de/details/win.godzilla_loader>

Last change to this tool card: 29 April 2020

Download this tool card in JSON format

All groups using tool Godzilla

ChangedNameCountryObserved

APT groups

 DalbitChina2022 
 Operation Silent Skimmer[Unknown]2022 

Other groups

 TA554[Unknown]2017 

3 groups listed (2 APT, 1 other, 0 unknown)

Digital Service Security Center
Electronic Transactions Development Agency

Follow us on

Facebook Twitter

Report incidents

Telephone +66 (0)2-123-1227
E-mail [email protected]