Names | SilkBean | |
Category | Malware | |
Type | Reconnaissance, Backdoor, Info stealer, Exfiltration, Downloader | |
Description | (Lookout) A hallmark of SilkBean is the comprehensive RAT (remote access trojan) functionality that allows an attacker to execute over 70 different commands on an infected device. SilkBean is delivered via applications that possess malicious functionality, but mimic titles and icons that a target may want to install. The legitimate app with functionality the user expects is packaged within the malware and installed after SilkBean successfully infects a target device. | |
Information | <https://www.lookout.com/documents/threat-reports/us/lookout-uyghur-malware-tr-us.pdf> | |
MITRE ATT&CK | <https://attack.mitre.org/software/S0549/> | |
Malpedia | <https://malpedia.caad.fkie.fraunhofer.de/details/apk.silkbean> | |
AlienVault OTX | <https://otx.alienvault.com/browse/pulses?q=tag:SilkBean> |
Last change to this tool card: 30 December 2022
Download this tool card in JSON format
Changed | Name | Country | Observed | ||
APT groups | |||||
Ke3chang, Vixen Panda, APT 15, GREF, Playful Dragon | 2010-Late 2022 |
1 group listed (1 APT, 0 other, 0 unknown)
Digital Service Security Center Follow us on |
Report incidents |
|
+66 (0)2-123-1227 | ||
[email protected] |