misp-galaxy/clusters/backdoor.json

25 lines
1.1 KiB
JSON
Raw Normal View History

2018-07-06 19:09:52 +00:00
{
"authors": [
"raw-data"
],
2018-07-06 19:09:52 +00:00
"description": "A list of backdoor malware.",
"name": "Backdoor",
2018-07-06 19:09:52 +00:00
"source": "Open Sources",
"type": "backdoor",
"uuid": "75436e27-cb57-4f32-bf1d-9636dd78a2bf",
2018-07-06 19:09:52 +00:00
"values": [
{
"description": "Cross-platform malware written in Golang, compatible with Linux and Windows. Although there are some minor differences, both variants have the same functionality. The malware communicates with a CnC server using HTTP requests and performs functions based on the received commands. Results of command execution are sent in HTTP POST requests data (RSA-encrypted). Main functionalities are: (1) Execute arbitrary shell commands, (2) Upload/Download files. The PE variant of the infection, in addition, executes PowerShell scripts. A .Net version was also observed in the wild.",
2018-07-06 19:09:52 +00:00
"meta": {
"date": "July 2018.",
"refs": [
"https://blog.jpcert.or.jp/2018/07/malware-wellmes-9b78.html"
]
},
"uuid": "e0e79fab-0f1d-4fc2-b424-208cb019a9cd",
"value": "WellMess"
2018-07-06 19:09:52 +00:00
}
],
"version": 1
2018-07-06 19:09:52 +00:00
}