Sword2033
Description
(Palo Alto) Pivoting on the C2 domain, we identified one additional sample that also communicated with yrhsywu2009.zapto[.]org. Similar to the PingPull variant above, this sample was designed to connect to port 8443 over HTTPS. However, analysis of the sample revealed that it’s a simple backdoor that we track as Sword2033.
Names
Name |
---|
Sword2033 |
Category
Malware
Type
- Backdoor
- Downloader
- Exfiltration
Information
Malpedia
Other Information
Uuid
e658d68f-cd4b-4132-8198-ff06d6c75da5
Last Card Change
2023-06-22