
| Names | Snugy | |
| Category | Malware | |
| Type | Backdoor, Tunneling | |
| Description | (Palo Alto) The OfficeIntegrator.ps1 file seen in the ResolutionHosts task is a PowerShell-based backdoor we call Snugy, which allows an actor to obtain the system’s hostname and to run commands. Snugy is a variant of the CASHY200 backdoor used by actors in previous attacks in the xHunt campaign. In July 2019, Trend Micro created a detection signature for this backdoor called Backdoor.PS1.NETERO.A, which suggests that this particular variant of CASHY200 has been around for over a year. We are calling this variant of the backdoor Snugy, as Netero is already a name of a variant of the Hisoka tool used by the xHunt actors. | |
| Information | <https://unit42.paloaltonetworks.com/xhunt-campaign-backdoors/> | |
| Malpedia | <https://malpedia.caad.fkie.fraunhofer.de/details/ps1.snugy> | |
Last change to this tool card: 29 December 2022
Download this tool card in JSON format
| Changed | Name | Country | Observed | ||
APT groups | |||||
| xHunt | 2018-Aug 2019 | ||||
1 group listed (1 APT, 0 other, 0 unknown)
|
Digital Service Security Center Follow us on |
Report incidents |
|
| +66 (0)2-123-1227 | ||
| [email protected] | ||