Geppei
Description
(Symantec) The first malicious activity Symantec researchers saw on victim machines was the presence of a previously undocumented dropper (Trojan.Geppei). It uses PyInstaller, which converts Python script to an executable file. Geppei reads commands from a legitimate IIS log. IIS logs are meant to record data from IIS, such as web pages and apps. The attackers can send commands to a compromised web server by disguising them as web access requests. IIS logs them as normal but Trojan.Geppei can read them as commands. The commands read by Geppei contain malicious encoded .ashx files. These files are saved to an arbitrary folder determined by the command parameter and they run as backdoors.
Names
Name |
---|
Geppei |
Category
Malware
Type
- Dropper
Information
Other Information
Uuid
46e2b498-934d-47a5-9dab-9d4cdda34c97
Last Card Change
2022-11-18