Kikothac

Description

(Group-IB) During the first operations the cybercriminals used a third-party patched backdoor Kikothac without access to its source code. They chose a Trojan, which had been known since November 2015, and did not require a lot of time for reverse engineering and back end implementation. The usage of this disassembled backdoor indicates that the group started without preparation and the first operation was a mere attempt to test their capabilities.

Names

Name
Kikothac

Category

Malware

Type

  • Backdoor

Information

Malpedia

Other Information

Uuid

ac6315b8-395b-4337-935c-feaad4b4dbab

Last Card Change

2020-04-23