Kegotip

Description

(IBM) One of Kegotip’s main functions is scraping email addresses from hard drives of endpoints it infects, even crossing to additional partitions on the endpoint. This generates quite a handsome bounty for its operators, likely in the form of the Necurs botnet itself, which then uses these addresses in its spam runs. Kegotip has been appearing alongside Dridex and Locky infections since April 2016, either via the RockLoader or Upatre.

Names

Name
Kegotip

Category

Malware

Type

  • Info stealer

Information

Malpedia

Alienvault Otx

Other Information

Uuid

9863262f-6f94-4272-9e17-9b5799115a85

Last Card Change

2020-04-23