ETDA สำนักงานพัฒนาธุรกรรมทางอิเล็กทรอนิกส์
Electronic Transactions Development Agency
Report
Search
Home > List all groups > List all tools > List all groups using tool Uroburos

Threat Group Cards: A Threat Actor Encyclopedia

Permanent link Tool: Uroburos

NamesUroburos
Urouros
Turla
Snake
CategoryMalware
TypeRootkit, Backdoor, Info stealer, Exfiltration
Description(G Data) Uroburos is a rootkit, composed of two files, a driver and an encrypted virtual file system. The rootkit is able to take control of an infected machine, execute arbitrary commands and hide system activities. It can steal information (most notably: files) and it is also able to capture network traffic. Its modular structure allows extending it with new features easily, which makes it not only highly sophisticated but also highly flexible and dangerous. Uroburos' driver part is extremely complex and is designed to be very discrete and very difficult to identify.
Information<https://public.gdatasoftware.com/Web/Content/INT/Blog/2014/02_2014/documents/GData_Uroburos_RedPaper_EN_v1.pdf>
<https://www.gdatasoftware.com/blog/2014/02/23968-uroburos-highly-complex-espionage-software-with-russian-roots>
<https://www.gdatasoftware.com/blog/2014/03/23966-uroburos-deeper-travel-into-kernel-protection-mitigation>
<https://www.gdatasoftware.com/blog/2014/05/23958-uroburos-rootkit-belgian-foreign-ministry-stricken>
<https://www.gdatasoftware.com/blog/2014/06/23953-analysis-of-uroburos-using-windbg>
<https://www.gdatasoftware.com/blog/2014/10/23941-com-object-hijacking-the-discreet-way-of-persistence>
<https://www.gdatasoftware.com/blog/2014/11/23937-the-uroburos-case-new-sophisticated-rat-identified>
<https://www.nccgroup.trust/uk/about-us/newsroom-and-events/blogs/2018/november/turla-png-dropper-is-back/>
<https://www.carbonblack.com/2017/08/18/threat-analysis-carbon-black-threat-research-dissects-png-dropper/>
<https://blog.fox-it.com/2017/05/03/snake-coming-soon-in-mac-os-x-flavour/>
<https://blog.malwarebytes.com/threat-analysis/2017/05/snake-malware-ported-windows-mac/>
<https://www.circl.lu/pub/tr-25/>
<https://www.lastline.com/labsblog/dissecting-turla-rootkit-malware-using-dynamic-analysis/>
<https://www.lastline.com/labsblog/turla-apt-group-gives-their-kernel-exploit-a-makeover/>
<https://unit42.paloaltonetworks.com/acidbox-rare-malware/>
MITRE ATT&CK<https://attack.mitre.org/software/S0022/>
Malpedia<https://malpedia.caad.fkie.fraunhofer.de/details/osx.uroburos>
<https://malpedia.caad.fkie.fraunhofer.de/details/win.uroburos>
AlienVault OTX<https://otx.alienvault.com/browse/pulses?q=tag:uroburos>

Last change to this tool card: 22 June 2020

Download this tool card in JSON format

All groups using tool Uroburos

ChangedNameCountryObserved

APT groups

XTurla, Waterbug, Venomous BearRussia1996-May 2022 HOT 

1 group listed (1 APT, 0 other, 0 unknown)

Digital Service Security Center
Electronic Transactions Development Agency

Follow us on

Facebook Twitter

Report incidents

Telephone +66 (0)2-123-1227
E-mail [email protected]