Kamikakabot

Malware updated 5 months ago (2024-05-04T18:02:47.725Z)
Download STIX
Preview STIX
KamiKakaBot is a potent malware designed to extract sensitive information from popular browsers such as Chrome, MS Edge, and Firefox. Discovered by researchers, this malicious software is deployed by the DarkPink APT group, primarily targeting the Asia-Pacific region. The malware infiltrates systems through suspicious downloads, emails, or websites, often unbeknownst to the user. Once inside, it can disrupt operations, steal personal data, or even hold the user's data hostage for ransom. Researchers have noted that the malware executes through a DLL side-loading technique, using the social media platform Telegram as its command and control. The malware uses sophisticated infiltration and lateral movement techniques, including email attachments and HTTP/S transfers. Specific instances include KamiKakaBot being sent as a ZIP attachment in emails (#8701 and #8700) and transferred over HTTP/S (#8699 and #8698). These methods allow the malware to penetrate initial defenses and then move laterally within networks, increasing its reach and potential damage. Further, researchers have observed KamiKakaBot being delivered via phishing emails containing a malicious ISO file as an attachment, adding another layer of complexity to its distribution methods. When a user unwittingly clicks on a file named WinWord.exe, the KamiKakaBot loader (MSVCR100.dll), located in the same folder, automatically loads and executes into the memory of WinWord.exe. This stealthy execution process allows the malware to operate undetected, gathering sensitive information without alerting the user or triggering standard security protocols. SafeBreach has provided coverage of the KamiKakaBot Information Stealer Malware, contributing to the broader understanding of this threat and helping organizations develop effective countermeasures.
Description last updated: 2024-03-25T15:16:26.671Z
What's your take? (Question 1 of 5)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Aliases We are not currently tracking any aliases
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Malware
Chrome
Apt
Loader
Firefox
Phishing
Windows
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Associated Threat Actors
To see the evidence that has resulted in these threatActor associations, create a free account
Alias DescriptionAssociation TypeVotes
The Dark Pink Threat Actor is associated with Kamikakabot. Dark Pink, also known as Saaiwc Group, is a Chinese-aligned cyberespionage entity that has been particularly active since mid-2022. The threat actor has conducted spearphishing campaigns against government, military, and non-profit organizations in Southeast Asia and parts of Europe, using sophisticUnspecified
4
Source Document References
Information about the Kamikakabot Malware was read from the documents corpus below. This display is limited to 20 results, create a free account to see more