ETDA สำนักงานพัฒนาธุรกรรมทางอิเล็กทรอนิกส์
Electronic Transactions Development Agency
Report
Search
Home > List all groups > List all tools > List all groups using tool Tonnerre

Threat Group Cards: A Threat Actor Encyclopedia

Permanent link Tool: Tonnerre

NamesTonnerre
CategoryMalware
TypeBackdoor, Info stealer, Exfiltration
Description(Check Point) The malware contains 5 Delphi forms, with each one responsible for a different capability:
Form1 – Malware Installation and upgrading process.
Form2 – Collects files from predefined folders – Documents, Downloads, Pictures and more.
Form3 – Connects to an FTP server to exfiltrate collected data and get further commands.
Form4 – Collects files from removable devices for exfiltration.
Form5 – Uses the lame command line tool to record sound.
Information<https://research.checkpoint.com/2021/after-lightning-comes-thunder/>
<https://download.bitdefender.com/resources/files/News/CaseStudies/study/393/Bitdefender-Whitepaper-Iranian-APT-Makes-a-Comeback-with-Thunder-and-Lightning-Backdoor-and-Espionage-Combo.pdf>
Malpedia<https://malpedia.caad.fkie.fraunhofer.de/details/win.tonnerre>

Last change to this tool card: 24 April 2021

Download this tool card in JSON format

All groups using tool Tonnerre

ChangedNameCountryObserved

APT groups

 Infy, Prince of PersiaIran2007-Feb 2017X

1 group listed (1 APT, 0 other, 0 unknown)

Digital Service Security Center
Electronic Transactions Development Agency

Follow us on

Facebook Twitter

Report incidents

Telephone +66 (0)2-123-1227
E-mail [email protected]