MOPSLED
Description
(Mandiant) MOPSLED is a shellcode-based modular backdoor that has the capability to communicate over HTTP or a custom binary protocol over TCP to its C2 server. The core functionality of MOPSLED involves expanding its capabilities by retrieving plugins from the C2 server. MOPSLED also uses a custom ChaCha20 encryption algorithm to decrypt embedded and external configuration files.
Mandiant observed sharing of MOPSLED between other Chinese cyber espionage groups including APT41. Mandiant considered MOPSLED to be an evolution of CrossWalk, which can act as a network proxy.
Names
Name |
---|
MOPSLED |
Category
Malware
Type
- Reconnaissance
- Backdoor
Information
Other Information
Uuid
50d20909-9e12-4a46-8305-7af8ae4ae861
Last Card Change
2024-08-26