Crutch

Description

(ESET) We were able to capture some of the commands sent by the operators to several Crutch v3 instances, which is helpful to understand the goal of the operation. The operators were mainly doing reconnaissance, lateral movement and espionage. The main malicious activity is the staging, compression and exfiltration of documents and various files, as shown in Figure 1. These are commands manually executed by the operators, thus not showing the automated collection of documents by the drive monitor component described in a later section.

Names

Name
Crutch

Category

Malware

Type

  • Reconnaissance
  • Backdoor
  • Exfiltration

Information

Mitre Attack

Malpedia

Other Information

Uuid

f1fccfe7-45d8-4a18-ac92-ef5aca3809a7

Last Card Change

2022-12-30