ETDA สำนักงานพัฒนาธุรกรรมทางอิเล็กทรอนิกส์
Electronic Transactions Development Agency
Report
Search
Home > List all groups > List all tools > List all groups using tool Gcat

Threat Group Cards: A Threat Actor Encyclopedia

Permanent link Tool: Gcat

NamesGcat
CategoryTools
TypeBackdoor
DescriptionA PoC backdoor that uses Gmail as a C&C server

(ESET) [During the Sandworm analysis] We expected to see the BlackEnergy malware as the final payload, but a different malware was used this time. The attackers used modified versions of an open-source gcat backdoor written in the Python programming language. The python script was converted into a stand-alone executable using PyInstaller program.
Information<https://www.welivesecurity.com/2016/01/20/new-wave-attacks-ukrainian-power-industry/>
<https://github.com/byt3bl33d3r/gcat>

Last change to this tool card: 20 April 2020

Download this tool card in JSON format

All groups using tool Gcat

ChangedNameCountryObserved

APT groups

XSandworm Team, Iron Viking, Voodoo BearRussia2009-May 2023X

1 group listed (1 APT, 0 other, 0 unknown)

Digital Service Security Center
Electronic Transactions Development Agency

Follow us on

Facebook Twitter

Report incidents

Telephone +66 (0)2-123-1227
E-mail [email protected]