LOWBALL
Description
(FireEye) This backdoor, known as LOWBALL, uses the legitimate Dropbox cloud-storage service to act as the CnC server. It uses the Dropbox API with a hardcoded bearer access token and has the ability to download, upload, and execute files. The communication occurs via HTTPS over port 443.
Names
Name |
---|
LOWBALL |
Category
Malware
Type
- Backdoor
- Exfiltration
Information
Mitre Attack
Malpedia
Alienvault Otx
Other Information
Uuid
1cf868dc-4067-40c8-aaec-a47cfac9f37c
Last Card Change
2020-04-23