NukeSped

Description

(Fortinet) We have reverse-engineered the logic of the RAT and found many classical RAT features:

• Iterate files in a folder • Create a process as another user • Iterate processes and modules • Terminate a process • Create a process • Write a file • Read a file • Connect to a remote host • Move a file
• Retrieve and launch additional payloads from the internet • Get information about installed disks, including the disk type and the amount of free space on the disk • Get the current directory • Change to a different directory • Remove itself and artifacts associated with it from the infected system

Names

Name
NukeSped

Category

Malware

Type

  • Reconnaissance
  • Backdoor
  • Info stealer
  • Downloader

Information

Alienvault Otx

Other Information

Uuid

c3cd0b9b-69d9-4e2d-9e56-b856dd8b48a9

Last Card Change

2020-04-20