Cucky
Description
(Group-IB) The threat actor also created two custom stealers, dubbed Cucky and Ctealer by Group-IB. When launched on the victims’ device, the stealers are able to steal passwords, history, logins, and cookies from dozens of web browsers. In this campaign, the threat actors also wrote script that allowed them to transfer their malware to USB devices connected to the compromised machine, and also spread their malware across network shares.
Names
Name |
---|
Cucky |
Category
Malware
Type
- Info stealer
- Credential stealer
Information
Other Information
Uuid
e9a7ee71-bc81-4449-ad9a-cf0e280cf682
Last Card Change
2023-02-15