ETDA สำนักงานพัฒนาธุรกรรมทางอิเล็กทรอนิกส์
Electronic Transactions Development Agency
Report
Search
Home > List all groups > List all tools > List all groups using tool KopiLuwak

Threat Group Cards: A Threat Actor Encyclopedia

Permanent link Tool: KopiLuwak

NamesKopiLuwak
CategoryMalware
TypeReconnaissance, Backdoor
Description(Kaspersky) The KopiLuwak script is decoded by macro code very similar to that previously seen with IcedCoffee, but the resulting script is not the final step. This script is executed with a parameter used as a key to RC4 decrypt an additional layer of javascript that contains the system information collection and command and control beaconing functionality. KopiLuwak performs a more comprehensive system and network reconnaissance collection, and like IcedCoffee leaves very little on disk for investigators to discover other than the base script.
Information<https://securelist.com/shedding-skin-turlas-fresh-faces/88069/>
<https://securelist.com/blog/research/77429/kopiluwak-a-new-javascript-payload-from-turla/>
<https://www.proofpoint.com/us/threat-insight/post/turla-apt-actor-refreshes-kopiluwak-javascript-backdoor-use-g20-themed-attack>
MITRE ATT&CK<https://attack.mitre.org/software/S1075>
Malpedia<https://malpedia.caad.fkie.fraunhofer.de/details/js.kopiluwak>

Last change to this tool card: 30 November 2023

Download this tool card in JSON format

Previous: Konni
Next: Koredos

All groups using tool KopiLuwak

ChangedNameCountryObserved

APT groups

 Tomiris[Unknown]2020 
 Turla, Waterbug, Venomous BearRussia1996-Dec 2023 

2 groups listed (2 APT, 0 other, 0 unknown)

Digital Service Security Center
Electronic Transactions Development Agency

Follow us on

Facebook Twitter

Report incidents

Telephone +66 (0)2-123-1227
E-mail [email protected]