Caterpillar

Description

(ClearSky) Acting as a focal point, the group usually attacks webservers via a custom WebShell, namely Caterpillar – a variant of the open source WebShell ‘ASPXSpy’. By using WebShell, the attackers leave their fingerprint on the web server and the internal network, move laterally, and deploy additional tools. On each compromised network the attacker installed one or more WebShell, supposedly to gain persistence and diversify the use of similar tools. The attackers use the WebShell to communicate with their C&C server for running commands and exfiltrating sensitive information. Connection to the WebShell is made using NordVPN or ExpressVPN services.

Names

Name
Caterpillar

Category

Malware

Type

  • Reconnaissance
  • Backdoor
  • Info stealer
  • Downloader

Information

Other Information

Uuid

608a396b-d841-425f-955c-4d1ee77d65e5

Last Card Change

2021-04-19