PINEFLOWER

Description

(FireEye) CORRUPT KITTEN was the author’s chosen name for an Android implant that, according to the blog, ‘supports a full range of spying and device management capability’. The blog contained a summary analysis of this CORRUPT KITTEN implant and an MD5 hash for a DEX file allegedly using the same C&C server. Notably, the author also noted that the malware stored files ready for exfiltration in a directory named ‘.data_gsc98647a3’, the string we identified in our PINEFLOWER samples. It seemed likely that CORRUPT KITTEN and PINEFLOWER were one and the same.

Names

Name
PINEFLOWER
CORRUPT KITTEN

Category

Malware

Type

  • Backdoor
  • Info stealer
  • Exfiltration

Information

Malpedia

Other Information

Uuid

8a823fe9-e03f-4c37-be82-3288c05ec213

Last Card Change

2023-06-22