ETDA สำนักงานพัฒนาธุรกรรมทางอิเล็กทรอนิกส์
Electronic Transactions Development Agency
Report
Search
Home > List all groups > List all tools > List all groups using tool Topinambour

Threat Group Cards: A Threat Actor Encyclopedia

Permanent link Tool: Topinambour

NamesTopinambour
CategoryMalware
TypeReconnaissance, Backdoor, Info stealer, Exfiltration
Description(Kaspersky) The purpose of all this infrastructure and modules in JavaScript, .NET and PowerShell is to build a “fileless” module chain on the victim’s computer consisting of an initial small runner and several Windows system registry values containing the encrypted remote administration tool. The tool does all that a typical Trojan needs to accomplish: upload, download and execute files, fingerprint target systems. The PowerShell version of the Trojan also has the ability to get screenshots.
Information<https://securelist.com/turla-renews-its-arsenal-with-topinambour/91687/>
Malpedia<https://malpedia.caad.fkie.fraunhofer.de/details/win.topinambour>

Last change to this tool card: 22 June 2023

Download this tool card in JSON format

All groups using tool Topinambour

ChangedNameCountryObserved

APT groups

 Tomiris[Unknown]2020 
 Turla, Waterbug, Venomous BearRussia1996-Dec 2023 

2 groups listed (2 APT, 0 other, 0 unknown)

Digital Service Security Center
Electronic Transactions Development Agency

Follow us on

Facebook Twitter

Report incidents

Telephone +66 (0)2-123-1227
E-mail [email protected]