ETDA สำนักงานพัฒนาธุรกรรมทางอิเล็กทรอนิกส์
Electronic Transactions Development Agency
Report
Search
Home > List all groups > List all tools > List all groups using tool GraphicalProton

Threat Group Cards: A Threat Actor Encyclopedia

Permanent link Tool: GraphicalProton

NamesGraphicalProton
GraphDrop
SPICYBEAT
CategoryMalware
TypeLoader
Description(Recorded Future) GraphicalProton acts as a loader and, much like previously described samples of GraphicalNeutrino, is staged within an ISO or ZIP file and relies on the newly identified compromised domains for delivery to targeted hosts. Unlike GraphicalNeutrino, which employed note-taking web application Notion for C2, the newly identified GraphicalProton sample uses Microsoft's OneDrive for C2 communication.
Information<https://go.recordedfuture.com/hubfs/reports/cta-2023-0727-1.pdf>
Malpedia<https://malpedia.caad.fkie.fraunhofer.de/details/win.graphdrop>

Last change to this tool card: 30 November 2023

Download this tool card in JSON format

All groups using tool GraphicalProton

ChangedNameCountryObserved

APT groups

XAPT 29, Cozy Bear, The DukesRussia2008-Jun 2024X

1 group listed (1 APT, 0 other, 0 unknown)

Digital Service Security Center
Electronic Transactions Development Agency

Follow us on

Facebook Twitter

Report incidents

Telephone +66 (0)2-123-1227
E-mail [email protected]