Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Intel]: https://www.group-ib.com/blog/krasue-rat/ #797

Open
timb-machine opened this issue Feb 1, 2024 · 0 comments
Open

[Intel]: https://www.group-ib.com/blog/krasue-rat/ #797

timb-machine opened this issue Feb 1, 2024 · 0 comments
Assignees

Comments

@timb-machine
Copy link
Owner

Area

Malware reports

Parent threat

Persistence, Privilege Escalation, Defense Evasion, Command and Control

Finding

https://www.group-ib.com/blog/krasue-rat/

Industry reference

uses:AbnormalSignal
attack:T1071:Application Layer Protocol
uses:RTSP
attack:T1547.006:Kernel Modules and Extensions
attack:T1564.001:Hidden Files and Directories
attack:T1205:Traffic Signaling

Malware reference

Krasue
Diamorphine
#217
Suterusu
#491
Rooty
#440

Actor reference

No response

Component

Linux

Scenario

No response

@timb-machine timb-machine self-assigned this Feb 1, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

1 participant