Skip to content

[Intel]: https://blogs-jpcert-or-jp.translate.goog/ja/2023/07/dangerouspassword_dev.html?_x_tr_sl=auto&_x_tr_tl=en&_x_tr_hl=en-US&_x_tr_pto=wapp #721

@timb-machine

Description

@timb-machine

Area

Malware reports

Parent threat

Defense Evasion, Command and Control

Finding

https://blogs-jpcert-or-jp.translate.goog/ja/2023/07/dangerouspassword_dev.html

Industry reference

uses:Python
uses:JavaScript
attack:T1140:Deobfuscate/Decode Files or Information

Malware reference

PythonHTTPBackdoor
wltm

Actor reference

DangerousPassword
CryptoMimic
SnatchCrypto

Component

Linux

Scenario

No response

Metadata

Metadata

Assignees

Labels

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions