ETDA สำนักงานพัฒนาธุรกรรมทางอิเล็กทรอนิกส์
Electronic Transactions Development Agency
Report
Search
Home > List all groups > List all tools > List all groups using tool Powerkatz

Threat Group Cards: A Threat Actor Encyclopedia

Permanent link Tool: Powerkatz

NamesPowerkatz
CategoryMalware
TypeLoader
Description(Yoroi) As intended by its name, it is able to start a new asynchronous task on the victim’s machine, executing the task object passed as _app parameter. Once the task is started, the function waits its completion using repeated 1-sec sleeps cycle, and then it returns a valid code status to the function caller. Probably this module can be used in conjunction with some other functions, belonging to other pieces of the implant, to perform malicious actions in background, making all more stealth.

Note: not the same software as an open source project on GitHub.
Information<https://yoroi.company/research/the-arsenal-behind-the-australian-parliament-hack/>
Malpedia<https://malpedia.caad.fkie.fraunhofer.de/details/win.powerkatz>

Last change to this tool card: 23 April 2020

Download this tool card in JSON format

All groups using tool Powerkatz

ChangedNameCountryObserved

APT groups

 IridiumIran2018-Dec 2018 

1 group listed (1 APT, 0 other, 0 unknown)

Digital Service Security Center
Electronic Transactions Development Agency

Follow us on

Facebook Twitter

Report incidents

Telephone +66 (0)2-123-1227
E-mail [email protected]