Names | SPARKLOG | |
Category | Malware | |
Type | Loader | |
Description | (Cybereason) SPARKLOG (spark.exe) is a 32 bit executable written in C++, employed in this attack to extract a DLL from the CLFS file, decrypt it and then launch it for side-loading by Windows services running as SYSTEM. Executing this phase of the attack successfully enables the attackers to gain Privilege Escalation and also Persistence in a specific case. | |
Information | <https://www.cybereason.com/blog/operation-cuckoobees-a-winnti-malware-arsenal-deep-dive> |
Last change to this tool card: 19 July 2022
Download this tool card in JSON format
Changed | Name | Country | Observed | ||
APT groups | |||||
APT 41 | 2012-Aug 2024 |
1 group listed (1 APT, 0 other, 0 unknown)
Digital Service Security Center Follow us on |
Report incidents |
|
+66 (0)2-123-1227 | ||
[email protected] |