Carberp

Malware Profile Updated 3 months ago
Download STIX
Preview STIX
Carberp is a notable malware that has been widely used and modified by various threat actors. Its source code, which was leaked in 2013, has become the basis for a multitude of other malicious software due to its sophisticated design and capabilities. The malware can infiltrate systems through dubious downloads, emails, or websites, often unbeknownst to the user. Once inside a system, it can steal personal information, disrupt operations, or even hold data hostage for ransom. Carberp's code, particularly its method of resolving API functions, has been adopted and adapted in numerous subsequent versions of the Trojan. The Sofacy group, also known as APT28, has been one of the most prominent users of Carberp-based malware. In 2013, the group expanded its arsenal to include more backdoors and tools, many of which incorporated elements from the Carberp source code. These tools included CORESHELL, SPLM (also known as Xagent or CHOPSTICK), JHUHUGIT, and AZZY (also known as ADVSTORESHELL, NETUI, EVILTOSS). The group has launched spear-phishing attacks with Flash exploits leading to their Carberp-based JHUHUGIT downloaders and further stages of malware. In 2016, they deployed the Seduploader and Downdelph malware, both based on the Carberp Trojan. Another noteworthy trait of Carberp is its elegant application program interface (API) obfuscation, which has been borrowed by other malware developers. This obfuscation can be overcome using an Interactive Disassembler (IDA) Python script, given that the hashed values are available within Carberp’s leaked source code. For instance, TrickBot's obfuscation method bears significant resemblance to Carberp's API obfuscation, suggesting that it was likely borrowed from the Carberp Trojan. This widespread use and modification of Carberp's code underscore its significant impact on the landscape of cyber threats.
What's your take? (Question 1 of 5)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Possible Aliases / Cluster overlaps
It's hard to track cluster overlaps and naming conventions between vendors, so here are some possible overlapping names / profiles you also may want to look at.
IDVotesProfile Description
Splm
1
SPLM, also known as XAgent or CHOPSTICK, is a sophisticated malware variant deployed by the Sofacy group. The group, notorious for its cyber espionage campaigns, expanded its arsenal in 2013, adding SPLM among other backdoors and tools such as CORESHELL, JHUHUGIT, AZZY, and more. These campaigns hav
CORESHELL
1
Coreshell is a variant of Sofacy malware used by threat actors to compromise systems and steal sensitive information. Malware, like Coreshell, can infect computer systems through suspicious downloads, emails, or websites. Once inside, it can disrupt operations, steal personal information, or hold da
ADVSTORESHELL
1
None
JHUHUGIT
1
Jhuhugit is a type of malware that was used in Sofacy attacks as a first-stage implant. It became relatively popular and was also used with a Java zero-day in July 2015. The Sofacy group, which utilized jhuhugit, expanded their arsenal in 2013 by adding more backdoors and tools, including CORESHELL,
Azzy
1
Azzy is a malware implant developed by the Sofacy group, known for its malicious activities aimed at exploiting and damaging computer systems. Earlier this year, we identified a new release of the Azzy implant that was largely undetected by anti-malware products at the time. This version first appea
Downdelph
1
None
TrickBot
1
TrickBot is a notorious form of malware that infiltrates systems to exploit and damage them, often through suspicious downloads, emails, or websites. Once it has breached a system, TrickBot can steal personal information, disrupt operations, and even hold data hostage for ransom. It has been linked
Xagent
1
XAgent is a sophisticated malware developed by the Sofacy group, also known as APT28 or Fancy Bear. This malicious software was added to the group's arsenal in 2013, alongside other backdoors and tools such as CORESHELL, SPLM (also known as Xagent or CHOPSTICK), JHUHUGIT, AZZY, and others. XAgent is
Kbot
1
KBot, a malware identified and analyzed by Kaspersky in February 2020, is one of the most recent viruses to spread in the wild. This malicious software, designed to exploit and damage computers or devices, typically infiltrates systems through suspicious downloads, emails, or websites, often unbekno
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Malware
Backdoor
Windows
JavaScript
Exploits
Encrypt
Macos
Trojan
Antivirus
Associated Malware
To see the evidence that has resulted in this association, create a free account
IDTypeVotesProfile Description
KomplexUnspecified
1
Komplex is a form of malware believed to be used by the Sofacy group, a cyber espionage group. This backdoor Trojan targets macOS systems and shares similarities with XAgentOSX, another tool supposedly developed by the same actor. The authors of this malware have named it Komplex, which was discover
CarbanakUnspecified
1
Carbanak is a sophisticated type of malware, short for malicious software, that is designed to exploit and damage computer systems. It can infiltrate systems through suspicious downloads, emails, or websites, often without the user's knowledge. Once inside, it can steal personal information, disrupt
Trickbot’sUnspecified
1
None
RamsayUnspecified
1
Ramsay is a sophisticated malware that was discovered by researchers at ESET in 2020. This malicious software is designed to infiltrate and exploit air-gapped networks, which are typically isolated from other networks for security reasons. Once it has infected a system, Ramsay can collect and exfilt
IsfbUnspecified
1
ISFB, also known as Gozi or Ursnif, is a form of malware that has been a significant part of the cyberthreat landscape for several years. This malicious software is designed to exploit and damage computer systems, often infiltrating through suspicious downloads, emails, or websites without the user'
Associated Threat Actors
To see the evidence that has resulted in this association, create a free account
IDTypeVotesProfile Description
SofacyUnspecified
1
Sofacy is a threat actor group that has been observed using multiple languages to create variants of the Zebrocy Trojan and Cannon. In one campaign, they relied heavily on filenames to lure victims into launching weaponized documents. The group packed only Delphi variants in an attempt to increase e
APT28Unspecified
1
APT28, also known as Fancy Bear, is a threat actor linked to Russia and has been involved in numerous cyber espionage campaigns. The group is notorious for its sophisticated tactics, techniques, and procedures (TTPs). Recently, NATO and the EU formally condemned APT28's activities, acknowledging the
Sofacy GroupUnspecified
1
The Sofacy Group, also known as APT28, Fancy Bear, Pawn Storm, Sednit, BlueDelta, and STRONTIUM, is a significant threat actor in the global cybersecurity landscape. Active since at least 2007, this group has targeted governments, militaries, and security organizations worldwide. The group's activit
Associated Vulnerabilities
To see the evidence that has resulted in this association, create a free account
IDTypeVotesProfile Description
No associations to display
Source Document References
Information about the Carberp Malware was read from the documents corpus below. This display is limited to 20 results, create a free account to see more
SourceCreatedAtTitle
MITRE
a year ago
Sofacy APT hits high profile targets with updated toolset
MITRE
a year ago
IRON TWILIGHT Supports Active Measures
MITRE
a year ago
A Slice of 2017 Sofacy Activity
MITRE
a year ago
Tricks of the Trade: A Deeper Look Into TrickBot's Machinations
MITRE
a year ago
Trickbot Adds Credential-Grabbing Capabilities
MITRE
a year ago
PowerLoader Injection – Something truly amazing – MalwareTech
MITRE
a year ago
XAgentOSX: Sofacy’s XAgent macOS Tool
MITRE
a year ago
Sofacy Attacks Multiple Government Entities
MITRE
a year ago
Ramsay: A cyber‑espionage toolkit tailored for air‑gapped networks | WeLiveSecurity
MITRE
a year ago
The Great Bank Robbery: the Carbanak APT
MITRE
a year ago
CARBERP - Threat Encyclopedia
MITRE
a year ago
Sofacy’s ‘Komplex’ OS X Trojan
CERT Polska
a year ago
Newest addition to a happy family: KBOT