
| Names | dneSpy | |
| Category | Malware | |
| Type | Backdoor, Info stealer, Exfiltration | |
| Description | DneSpy collects information, takes screenshots, and downloads and executes the latest version of other malicious components in the infected system. The malware is designed to receive a “policy” file in JSON format with all the commands to execute. The policy file sent by the C&C server can be changed and updated over time, making dneSpy flexible and well-designed. The output of each executed command is zipped, encrypted, and exfiltrated to the C&C server. These characteristics make dneSpy a fully functional espionage backdoor. | |
| Information | <https://www.trendmicro.com/en_us/research/20/j/operation-earth-kitsune-a-dance-of-two-new-backdoors.html> <https://documents.trendmicro.com/assets/white_papers/wp-operation-earth-kitsune.pdf> | |
| Malpedia | <https://malpedia.caad.fkie.fraunhofer.de/details/win.dnespy> | |
Last change to this tool card: 29 December 2022
Download this tool card in JSON format
| Changed | Name | Country | Observed | ||
APT groups | |||||
| Operation Earth Kitsune | 2019-Late 2022 | ||||
1 group listed (1 APT, 0 other, 0 unknown)
|
Digital Service Security Center Follow us on |
Report incidents |
|
| +66 (0)2-123-1227 | ||
| [email protected] | ||