Spark

Description

(Cybereason) The Spark backdoor allows the attackers to: • Collect information about the infected machine. • Encrypt the collected data and send it to the attackers over the HTTP protocol. • Download additional payloads. • Log keystrokes. • Record audio using the computer’s microphone. • Execute commands on the infected machine.

The creators of the Spark backdoor use a few techniques that are intended to keep the backdoor under-the-radar, including: • Packing the payloads with the Enigma packer. • Checking for antivirus and other security products using WMI. • Validating Arabic keyboard and language settings on the infected machine.

Names

Name
Spark

Category

Malware

Type

  • Reconnaissance
  • Backdoor
  • Keylogger
  • Info stealer
  • Downloader

Information

Mitre Attack

Malpedia

Other Information

Uuid

934e2c2c-e02e-4deb-afa4-064a1b10c29b

Last Card Change

2022-12-30