WebC2

Description

A WEBC2 backdoor is designed to retrieve a Web page from a pre-determined C2 server. It expects the Web page to contain special HTML tags; the backdoor will attempt to interpret the data between the tags as commands. This family of malware is capable of downloading and executing a file. All variants represented here are the same file with different MD5 signatures. This malware attempts to contact its C2 once a week (Thursday at 10:00 AM). It looks for commands inside a set of HTML tags, part of which are in the File Strings indicator term below.

Names

Name
WebC2
WebC2-AdSpace
WebC2-Ausov
WebC2-Bolid
WebC2-Cson
WebC2-DIV
WebC2-GreenCat
WebC2-Head
WebC2-Kt3
WebC2-Qbp
WebC2-Rave
WebC2-Table
WebC2-UGX
WebC2-Yahoo

Category

Malware

Type

  • Backdoor
  • Downloader

Information

Mitre Attack

Malpedia

Other Information

Uuid

a1e54b72-3eed-49ae-852c-9621bdde6be3

Last Card Change

2020-04-23