HyperBro
Description
(Kaspersky) The operators used the HyperBro Trojan as their last-stage in-memory remote administration tool (RAT). The timestamps for these modules are from December 2017 until January 2018. The anti-detection launcher and decompressor make extensive use of Metasploit’s shikata_ga_nai encoder as well as LZNT1 compression.
Names
Name |
---|
HyperBro |
Category
Malware
Type
- Backdoor
- Info stealer
- Credential stealer
- Keylogger
Information
Mitre Attack
Malpedia
Alienvault Otx
Other Information
Uuid
b4c5f160-6c46-4cd3-8abe-420b314ffe0e
Last Card Change
2021-11-01