ETDA สำนักงานพัฒนาธุรกรรมทางอิเล็กทรอนิกส์
Electronic Transactions Development Agency
Home > List all groups > List all tools > List all groups using tool POORAIM

Threat Group Cards: A Threat Actor Encyclopedia

Permanent link Tool: POORAIM

TypeReconnaissance, Backdoor, Info stealer, Exfiltration
Description(FireEye) POORAIM malware is designed with basic backdoor functionality and leverages AOL Instant Messenger for command and control communications. POORAIM includes the following capabilities: System information enumeration, File browsing, manipulation and exfiltration, Process enumeration, Screen capture, File execution, Exfiltration of browser favorites, and battery status. Exfiltrated data is sent via files over AIM.

POORAIM has been involved in campaigns against South Korean media organizations and sites relating to North Korean refugees and defectors since early 2014.

Compromised sites have acted as watering holes to deliver newer variants of POORAIM.

Last change to this tool card: 22 April 2020

Download this tool card in JSON format

All groups using tool POORAIM


APT groups

 Reaper, APT 37, Ricochet Chollima, ScarCruftNorth Korea2012-Mar 2022X

1 group listed (1 APT, 0 other, 0 unknown)

Digital Service Security Center
Electronic Transactions Development Agency

Follow us on

Facebook Twitter

Report incidents

Telephone +66 (0)2-123-1227
E-mail [email protected]