NukeSped
Description
(Fortinet) We have reverse-engineered the logic of the RAT and found many classical RAT features:
• Iterate files in a folder
• Create a process as another user
• Iterate processes and modules
• Terminate a process
• Create a process
• Write a file
• Read a file
• Connect to a remote host
• Move a file
• Retrieve and launch additional payloads from the internet
• Get information about installed disks, including the disk type and the amount of free space on the disk
• Get the current directory
• Change to a different directory
• Remove itself and artifacts associated with it from the infected system
Names
Name |
---|
NukeSped |
Category
Malware
Type
- Reconnaissance
- Backdoor
- Info stealer
- Downloader
Information
Alienvault Otx
Other Information
Uuid
c3cd0b9b-69d9-4e2d-9e56-b856dd8b48a9
Last Card Change
2020-04-20