Samurai

Description

(Kaspersky) The final stage is a formerly unknown modular backdoor that we dubbed Samurai, due to a constant keyword used inside an important dictionary used by the malware to share data between its modules.

The library was developed in C# and uses the .NET HTTPListener class to receive and handle HTTP POST requests, looking for specially crafted requests that carry encrypted C# source code issued by the attackers. These programs will be in turn compiled and executed during runtime.

Names

Name
Samurai

Category

Malware

Type

  • Reconnaissance
  • Backdoor
  • Loader
  • Exfiltration
  • Tunneling

Information

Mitre Attack

Other Information

Uuid

21f8ae06-a671-47b9-a2ff-158c7974f6c3

Last Card Change

2024-06-19