Names | Separ | |
Category | Malware | |
Type | Info stealer | |
Description | (Kaspersky) What sets this stealer apart is its use of a simply but tricky technique dubbed “Living off the Land.” Hackers have used this popular tactic in the past to launch attacks based on legitimate files which are either common within the organization attacked, or are widely-used administrative tools. The legit files can be abused to perform malicious functions. For Separ, that means using very short script and batch files, as well as legitimate executables, to carry out all of its malicious business logic. | |
Information | <https://threatpost.com/separ-malware-credentials-phishing/142009/> |
Last change to this tool card: 20 April 2020
Download this tool card in JSON format
Changed | Name | Country | Observed | ||
APT groups | |||||
Gangnam Industrial Style | [Unknown] | 2019 |
1 group listed (1 APT, 0 other, 0 unknown)
Digital Service Security Center Follow us on |
Report incidents |
|
+66 (0)2-123-1227 | ||
[email protected] |