ETDA สำนักงานพัฒนาธุรกรรมทางอิเล็กทรอนิกส์
Electronic Transactions Development Agency
Report
Search
Home > List all groups > List all tools > List all groups using tool SparrowDoor

Threat Group Cards: A Threat Actor Encyclopedia

Permanent link Tool: SparrowDoor

NamesSparrowDoor
FamousSparrow
CategoryMalware
TypeBackdoor
Description(ESET) The connections could be either through a proxy or not, and they connect to the C&C server over port 443 (HTTPS). So, the communication should be encrypted using TLS. During the first attempt to contact the C&C server, SparrowDoor checks whether a connection can be established without using a proxy, and if it can’t, then the data is sent through a proxy. All outgoing data is encrypted using the XOR key hH7@83#mi and all incoming data is decrypted using the XOR key h*^4hFa. The data has a structure that starts with a Command ID, followed by the length of the ensuing encrypted data, followed by the encrypted data.
Information<https://www.welivesecurity.com/2021/09/23/famoussparrow-suspicious-hotel-guest/>
Malpedia<https://malpedia.caad.fkie.fraunhofer.de/details/win.sparrow_door>

Last change to this tool card: 28 December 2022

Download this tool card in JSON format

Previous: SparkRAT
Next: Speculoos

All groups using tool SparrowDoor

ChangedNameCountryObserved

APT groups

 FamousSparrow[Unknown]2019 

1 group listed (1 APT, 0 other, 0 unknown)

Digital Service Security Center
Electronic Transactions Development Agency

Follow us on

Facebook Twitter

Report incidents

Telephone +66 (0)2-123-1227
E-mail [email protected]