OpGhoul

Description

(Kaspersky) The malware is based on the Hawkeye commercial spyware, which provides a variety of tools for the attackers, in addition to malware anonymity from attribution. It initiates by self-deploying and configuring persistence, while using anti-debugging and timeout techniques, then starts collecting interesting data from the victim’s device, including: • Keystrokes • Clipboard data • FileZilla ftp server credentials • Account data from local browsers • Account data from local messaging clients (Paltalk, Google talk, AIM…) • Account data from local email clients (Outlook, Windows Live mail…) • License information of some installed applications

Names

Name
OpGhoul

Category

Malware

Type

  • Reconnaissance
  • Backdoor
  • Keylogger
  • Credential stealer
  • Info stealer

Information

Malpedia

Other Information

Uuid

95f5b536-a369-481f-a9da-71b6a4dc16ed

Last Card Change

2020-04-23