MoonWalk
Description
(ZScaler) APT41, a China-based nation-state threat actor known for campaigns in Southeast Asia, has been observed using a new backdoor called MoonWalk. MoonWalk shares a common development toolkit with DUSTTRAP, reusing code that implements evasive techniques such as DLL hollowing, import resolution, DLL unhooking, and call stack spoofing. Additionally, MoonWalk employs further evasion tactics, including the use of Google Drive as its C2 channel to blend in with legitimate network traffic and the utilization of Windows Fibers to evade AV/EDR security solutions. MoonWalk’s modular design allows attackers to easily update its capabilities, modify its behavior, and customize functionality for different scenarios.
Names
Name |
---|
MoonWalk |
CurveLast |
SneakCross |
Category
Malware
Type
- Backdoor
Information
Malpedia
Other Information
Uuid
fcd28a3d-27ab-4858-9982-f14c6bc77c8e
Last Card Change
2024-12-27