ETDA สำนักงานพัฒนาธุรกรรมทางอิเล็กทรอนิกส์
Electronic Transactions Development Agency
Report
Search
Home > List all groups > List all tools > List all groups using tool SPICA

Threat Group Cards: A Threat Actor Encyclopedia

Permanent link Tool: SPICA

NamesSPICA
CategoryMalware
TypeBackdoor, Reconnaissance, Credential stealer, Info stealer, Downloader, Exfiltration
Description(Google) SPICA is written in Rust, and uses JSON over websockets for command and control (C2). It supports a number of commands including:

• Executing arbitrary shell commands
• Stealing cookies from Chrome, Firefox, Opera and Edge
• Uploading and downloading files
• Perusing the filesystem by listing the contents of it
• Enumerating documents and exfiltrating them in an archive
• There is also a command called “telegram,” but the functionality of this command is unclear
Once executed, SPICA decodes an embedded PDF, writes it to disk, and opens it as a decoy for the user. In the background, it establishes persistence and starts the main C2 loop, waiting for commands to execute.
Information<https://blog.google/threat-analysis-group/google-tag-coldriver-russian-phishing-malware/>

Last change to this tool card: 06 March 2024

Download this tool card in JSON format

All groups using tool SPICA

ChangedNameCountryObserved

APT groups

 Cold RiverRussia2019-Mar 2023X

1 group listed (1 APT, 0 other, 0 unknown)

Digital Service Security Center
Electronic Transactions Development Agency

Follow us on

Facebook Twitter

Report incidents

Telephone +66 (0)2-123-1227
E-mail [email protected]