Names | Godzilla Godzilla Loader | |
Category | Malware | |
Type | Downloader, Worm, Botnet | |
Description | (Check Point) Enter Godzilla Loader, a malware being advertised on Dark Web forums, and being actively developed right now. Godzilla fills the “downloader” or “dropper” niche, offering a level of indirection such that the binary that first runs on the victim machine does not contain any of the actual payload, and instead downloads the payload from a remote server. Godzilla is actively maintained, with new features being added periodically, and retails for $500, around a quarter of the asking price of its better-established competitor, Emotet. | |
Information | <https://research.checkpoint.com/2018/godzilla-loader-and-the-long-tail-of-malware/> | |
Malpedia | <https://malpedia.caad.fkie.fraunhofer.de/details/win.godzilla_loader> |
Last change to this tool card: 29 April 2020
Download this tool card in JSON format
Changed | Name | Country | Observed | ||
APT groups | |||||
Dalbit | 2022 | ||||
Operation Silent Skimmer | [Unknown] | 2022 | |||
Other groups | |||||
TA554 | [Unknown] | 2017 |
3 groups listed (2 APT, 1 other, 0 unknown)
Digital Service Security Center Follow us on |
Report incidents |
|
+66 (0)2-123-1227 | ||
[email protected] |