Curkeep

Malware updated 2 months ago (2024-06-25T03:17:35.438Z)
Download STIX
Preview STIX
CurKeep is a malware that was first discovered in 2021 as part of an espionage campaign known as "Stayin' Alive". This campaign targeted the telecommunications industry and governments in Vietnam, Uzbekistan, and Kazakhstan. The attack chain began with a spear-phishing email containing a ZIP file attachment. This ZIP file contained a legitimate executable that leveraged DLL side-loading to load a backdoor called CurKeep via a rogue DLL, dal_keepalives.dll, present within the archive. This initial downloader was digitally signed to match the email context and exploited a vulnerability (CVE-2022-23748) in Audinate's Dante Discovery software to side-load the CurKeep malware onto the system. CurKeep is a small-sized backdoor malware, with a payload size of just 10kb. Once installed, it establishes persistence on the breached device and sends system information to the command-and-control (C2) server. It then lies dormant, waiting for commands from the C2 server. Although initially detected in attacks against entities in Vietnam, Uzbekistan, and Kazakhstan, the scope of the campaign using CurKeep is believed to be much wider than initially thought. In addition to CurKeep, numerous other malware loaders and backdoors have been spread by attackers through spear-phishing emails. These include the CurCore payload that enables remote command execution and the StylerServ backdoor that allows port traffic monitoring. These use infrastructure associated with ToddyCat, according to a report by Check Point. Despite its small size, CurKeep contains 26 functions and does not statically compile with any library, demonstrating the sophistication of this malicious software.
Description last updated: 2024-06-25T03:15:32.540Z
What's your take? (Question 1 of 2)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Aliases We are not currently tracking any aliases
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Downloader
Backdoor
Payload
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Source Document References
Information about the Curkeep Malware was read from the documents corpus below. This display is limited to 20 results, create a free account to see more
PreviewSource LinkCreatedAtTitle
DARKReading
2 months ago
China-Linked Espionage Groups Target Asian Telecoms
CERT-EU
a year ago
‘Stayin’ Alive’ cyber espionage campaign targets telecoms, governments in Asia
CERT-EU
a year ago
ToddyCat hackers use 'disposable' malware to target Asian telecoms
CERT-EU
a year ago
Researchers Uncover Ongoing Attacks Targeting Asian Governments and Telecom Giants
InfoSecurity-magazine
a year ago
Chinese APT ToddyCat Targets Asian Telecoms, Governments
CERT-EU
a year ago
Asian governments, telcos impacted by ToddyCat-linked attack campaign
Securityaffairs
a year ago
Stayin' Alive campaign targets high-profile Asian government and telecom entities. Is it linked to ToddyCat APT?
Checkpoint
a year ago
Stayin’ Alive - Targeted Attacks Against Telecoms and Government Ministries in Asia - Check Point Research