8.t Dropper
Description
8T_Dropper has been used by Chinese threat actor TA428 in order to install Cotx RAT onto victim’s machines during Operation LagTime IT. According to Proofpoint the attack was developed against a number of government agencies in East Asia overseeing government information technology, domestic affairs, foreign affairs, economic development, and political processes. The dropper was delivered through an RTF document exploiting CVE-2018-0798.
Names
Name |
---|
8.t Dropper |
8.t RTF exploit builder |
8t_dropper |
RoyalRoad |
Category
Malware
Type
- Dropper
Information
Malpedia
Other Information
Uuid
fc849859-2aa0-4b98-8573-36d9041fd1c2
Last Card Change
2021-04-24