Octopus
Description
(Kaspersky) The name was originally coined by ESET in 2017 after the 0ct0pus3.php script used by the actor on their old C2 servers.
In the case of Octopus, DustSquad used Delphi as their programming language of choice, which is unusual for such an actor.
In April 2018 we discovered a new Octopus sample pretending to be Telegram Messenger with a Russian interface. We couldn´t find any legitimate software that this malware appears to be impersonating; in fact, we don´t believe it exists. The Trojan uses third-party Delphi libraries like The Indy Project for JSON-based C2 communications and TurboPower Abbrevia (sourceforge.net/projects/tpabbrevia) for compression. Malware persistence is basic and achieved via the system registry. The server side uses commercial hosting in different countries with .php scripts deployed.
Names
Name |
---|
Octopus |
Category
Malware
Type
- Backdoor
Information
Mitre Attack
Malpedia
Other Information
Uuid
3d3bf55f-402e-4122-a52b-196aed8e6507
Last Card Change
2020-04-23