ETDA สำนักงานพัฒนาธุรกรรมทางอิเล็กทรอนิกส์
Electronic Transactions Development Agency
Report
Search
Home > List all groups > List all tools > List all groups using tool PyFlash

Threat Group Cards: A Threat Actor Encyclopedia

Permanent link Tool: PyFlash

NamesPyFlash
CategoryMalware
TypeBackdoor
Description(ESET) This second stage backdoor is a py2exe executable. py2exe is a Python extension to convert a Python script into a standalone Windows executable. To our knowledge, this is the first time the Turla developers have used the Python language in a backdoor.

The backdoor communicates with its hardcoded C&C server via HTTP. The C&C URL and other parameters such as the AES key and IV used to encrypt all network communications are specified at the beginning of the script.

The C&C server can also send backdoor commands in JSON format. The commands implemented in this version of PyFlash are:
• Download additional files from a given HTTP(S) link.
• Execute a Windows command using the Python function subprocess32.Popen.
• Change the execution delay: modifies the Windows task that regularly (every X minutes; 5 by default) launches the malware.
• Kill (uninstall) the malware.
Information<https://www.welivesecurity.com/2020/03/12/tracking-turla-new-backdoor-armenian-watering-holes/>
AlienVault OTX<https://otx.alienvault.com/browse/pulses?q=tag:PyFlash>

Last change to this tool card: 20 April 2020

Download this tool card in JSON format

All groups using tool PyFlash

ChangedNameCountryObserved

APT groups

 Turla, Waterbug, Venomous BearRussia1996-Dec 2023 

1 group listed (1 APT, 0 other, 0 unknown)

Digital Service Security Center
Electronic Transactions Development Agency

Follow us on

Facebook Twitter

Report incidents

Telephone +66 (0)2-123-1227
E-mail [email protected]