ETDA สำนักงานพัฒนาธุรกรรมทางอิเล็กทรอนิกส์
Electronic Transactions Development Agency
Report
Search
Home > List all groups > List all tools > List all groups using tool Pylot

Threat Group Cards: A Threat Actor Encyclopedia

Permanent link Tool: Pylot

NamesPylot
Travle
CategoryMalware
TypeBackdoor, Info stealer
Description(Carbon Black) The Pylot (or Travle) malware family appears to be an evolution of the NetTraveler malware family (which has been linked to attackers out of China by numerous sources). Over the last year a variant has been observed as a secondary payload often used in conjunction with malicious carrier files (typically MS Office or Rich Text Format (RTF) documents).

The Pylot malware has been observed being installed via shellcode from known CVEs in Office products as well as by malware loaders (or first stage malware variants, specifically the CMStar malware family). In late 2017 samples of the Pylot family were submitted, by customers, to the Carbon Black Threat Analysis Unit (TAU) as part of ongoing investigation.
Information<https://www.carbonblack.com/2018/01/26/threat-analysis-pylot-travle-malware-family/>
AlienVault OTX<https://otx.alienvault.com/browse/pulses?q=tag:PYLOT>

Last change to this tool card: 20 April 2020

Download this tool card in JSON format

Previous: PyFlash
Next: PyMICROPSIA

All groups using tool Pylot

ChangedNameCountryObserved

APT groups

 Vicious PandaChina2015-Mar 2020 

1 group listed (1 APT, 0 other, 0 unknown)

Digital Service Security Center
Electronic Transactions Development Agency

Follow us on

Facebook Twitter

Report incidents

Telephone +66 (0)2-123-1227
E-mail [email protected]