Names | Samurai | |
Category | Malware | |
Type | Reconnaissance, Backdoor, Loader, Exfiltration, Tunneling | |
Description | (Kaspersky) The final stage is a formerly unknown modular backdoor that we dubbed Samurai, due to a constant keyword used inside an important dictionary used by the malware to share data between its modules. The library was developed in C# and uses the .NET HTTPListener class to receive and handle HTTP POST requests, looking for specially crafted requests that carry encrypted C# source code issued by the attackers. These programs will be in turn compiled and executed during runtime. | |
Information | <https://securelist.com/toddycat/106799/> | |
MITRE ATT&CK | <https://attack.mitre.org/software/S1099> |
Last change to this tool card: 19 June 2024
Download this tool card in JSON format
Changed | Name | Country | Observed | ||
APT groups | |||||
ToddyCat | 2020-2021 |
1 group listed (1 APT, 0 other, 0 unknown)
Digital Service Security Center Follow us on |
Report incidents |
|
+66 (0)2-123-1227 | ||
[email protected] |