Graphite

Description

(Cluster25) Once obtained a new OAuth2 token, the Graphite malware will query the Microsoft GraphAPIs for new commands by enumerating the child files in the check OneDrive subdirectory. If a new file is found, the content is downloaded and decrypted through an AES-256-CBCdecryption algorithm. The monitoring of task executions and the uploading of their results is managed through a dedicated thread. Finally, the malware allows remote command execution by allocating a new region of memory and executing the received shellcode by calling a new dedicated thread.

Names

Name
Graphite

Category

Malware

Type

  • Backdoor

Information

Malpedia

Other Information

Uuid

54731956-6a9c-4fac-8622-2623eb886502

Last Card Change

2025-06-28