graphican

Malware updated 23 days ago (2024-11-29T13:36:52.235Z)
Download STIX
Preview STIX
Graphican is a novel malware developed by the Chinese threat actor group known as Flea, APT15, or Nickel. The malware, an evolution of the group's custom backdoor Ketrican, has been used in a series of cyber-attacks against foreign affairs ministries across Central and South America between late 2022 and early 2023. Unlike its predecessor, Graphican leverages the Microsoft Graph API and OneDrive to establish its command-and-control (C&C) infrastructure, a technique also employed by other threat groups such as APT28 and Bad Magic. The Graphican backdoor maintains the same core functionality as Ketrican, but its exploitation of Microsoft's services for C&C server details represents a significant upgrade. This malware can perform various operations based on commands received from the C&C server, including creating an interactive command line, generating files, downloading files, and creating processes with hidden windows. Its deployment signifies a continued trend of state-sponsored cyber threats aimed at infiltrating and disrupting foreign governmental operations. The discovery and analysis of the Graphican malware were detailed by the Threat Hunter Team at Symantec. This revelation underscores the persistent threat posed by state-sponsored actors like Flea, who have demonstrated their ability to evolve their techniques and tools over time. As a result, ongoing vigilance and proactive cybersecurity measures remain critical in countering such sophisticated threats.
Description last updated: 2024-05-04T16:40:59.574Z
What's your take? (Question 1 of 3)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Possible Aliases / Cluster overlaps
It's hard to track cluster overlaps and naming conventions between vendors, so here are some possible overlapping names / profiles you also may want to look at. Create a free account to see the source evidence for each alias, and help fix any errors.
Alias DescriptionVotes
Ketrican is a possible alias for graphican. Ketrican is a type of malware, or malicious software, that was developed to exploit and damage computer systems. It's associated with the Ke3chang group and is known for its ability to infiltrate systems through suspicious downloads, emails, or websites. Once inside a system, Ketrican can steal pers
2
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Backdoor
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Associated Malware
To see the evidence that has resulted in these malware associations, create a free account
Alias DescriptionAssociation TypeVotes
The BS2005 Malware is associated with graphican. BS2005 is a malicious software (malware) traditionally used by a cybercriminal group for harmful activities. The malware infiltrates systems via suspicious downloads, emails, or websites and can steal personal information, disrupt operations, or hold data hostage for ransom. BS2005, known as a backdUnspecified
2
Associated Threat Actors
To see the evidence that has resulted in these threatActor associations, create a free account
Alias DescriptionAssociation TypeVotes
The APT15 Threat Actor is associated with graphican. APT15, also known as Vixen Panda, Nickel, Flea, KE3CHANG, Royal APT, and Playful Dragon, is a threat actor group suspected to be of Chinese origin. The group targets global sectors including trade, economic and financial, energy, and military, aligning with the interests of the Chinese government. IUnspecified
2