Inception
Description
(Symantec) Word documents attached to Inception’s spear-phishing emails leveraged two Microsoft Office vulnerabilities (CVE-2014-1761 and CVE-2012-0158) to install malware on the recipient’s computer. The malware had a multi-staged structure that began with a malicious RTF document and ended with an in-memory DLL payload that communicated, via the WebDAV protocol, with a command and control (C&C) address from a legitimate cloud service provider (CloudMe.com). The name “Inception” comes from the group’s many levels of obfuscation and indirection it employed in delivering this payload.
Names
Name |
---|
Inception |
Category
Malware
Type
- Backdoor
Information
Other Information
Uuid
639ea4a1-7345-4e52-88b8-cc1cdb73ef2b
Last Card Change
2020-04-20