Masepie

Malware Profile Updated 3 months ago
Download STIX
Preview STIX
MASEPIE is a malicious software (malware) first discovered in December 2023, which is capable of establishing persistence on Windows machines and executing arbitrary commands. It is described as a small Python backdoor that enables the downloading and uploading of files. When victims click to view lure documents on attacker-controlled sites, they download this backdoor. One of the files MASEPIE downloads to infected machines is "Oceanmap," a C#-based tool for command execution via the Internet Message Access Protocol (IMAP). Another payload associated with this campaign is "Steelhook," which has information-stealing functionality. The malware was directed by a botnet based on compromised Ubiquiti routers, evidence suggests that both the WebDAV servers and the MASEPIE C2 servers may have been hosted on these compromised routers. This botnet was taken down by the U.S. government in early 2024. Advanced Persistent Threat group APT28 targeted Ukrainian government entities and Polish organizations using phishing messages designed to deploy bespoke implants and information stealers like MASEPIE, OCEANMAP, and STEELHOOK. APT28’s elaborate scheme ends with the execution of MASEPIE, OCEANMAP, and STEELHOOK, which are designed to exfiltrate files, run arbitrary commands, and steal browser data. In an update to their methodologies, ITG05 is utilizing the freely available hosting provider, firstcloudit[.]com to stage payloads to enable ongoing operations. The cybersecurity researchers Joe Fasulo, Claire Zaboeva, and Golo Mühr have been closely following and analyzing these developments.
What's your take? (Question 1 of 5)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Possible Aliases / Cluster overlaps
It's hard to track cluster overlaps and naming conventions between vendors, so here are some possible overlapping names / profiles you also may want to look at.
IDVotesProfile Description
Steelhook
3
Steelhook is a malicious PowerShell script used by the Russia-linked Advanced Persistent Threat group, APT28, to steal sensitive information from compromised systems. The malware was discovered as part of a phishing campaign orchestrated by APT28, as reported by the Computer Emergency Response Team
OCEANMAP
3
OceanMap is a C#-based malware used by APT28, a Russia-linked group, as part of a sophisticated cyber attack campaign that started in 2020. The malware is designed to execute base64-encoded commands via cmd.exe, providing persistent and remote access to the targeted endpoint. Once a command is execu
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Backdoor
Windows
Malware
Decoy
Apt
Lateral Move...
Botnet
Phishing
Reconnaissance
Ukraine
Payload
Openssh
Associated Malware
To see the evidence that has resulted in this association, create a free account
IDTypeVotesProfile Description
No associations to display
Associated Threat Actors
To see the evidence that has resulted in this association, create a free account
IDTypeVotesProfile Description
APT28Unspecified
1
APT28, also known as Fancy Bear, is a threat actor linked to Russia and has been involved in numerous cyber espionage campaigns. The group is notorious for its sophisticated tactics, techniques, and procedures (TTPs). Recently, NATO and the EU formally condemned APT28's activities, acknowledging the
Itg05Unspecified
1
ITG05, also known by various aliases including APT28, Fancy Bear, and Forest Blizzard, is a sophisticated malware that has been targeting non-governmental organizations (NGOs) through phishing lures. This harmful software, designed to exploit and damage computer systems, infects systems primarily th
Associated Vulnerabilities
To see the evidence that has resulted in this association, create a free account
IDTypeVotesProfile Description
No associations to display
Source Document References
Information about the Masepie Malware was read from the documents corpus below. This display is limited to 20 results, create a free account to see more
SourceCreatedAtTitle
CERT-EU
5 months ago
FBI Alert: Russian Hackers Target Ubiquiti Routers for Data, Botnet Creation
CERT-EU
5 months ago
Cybersecurity Agencies Warn Ubiquiti EdgeRouter Users of APT28's MooBot Threat | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware | National Cyber Security Consulting
CERT-EU
5 months ago
Russia-linked APT28 compromised Ubiquiti EdgeRouters to facilitate cyber operations
CERT-EU
7 months ago
Cyber Security Week In Review: December 29, 2023
BankInfoSecurity
7 months ago
Russian Military Intelligence Blamed for Blitzkrieg Hacks
CERT-EU
7 months ago
New malware found in analysis of Russian hacks on Ukraine, Poland | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker | National Cyber Security Consulting
Securityaffairs
7 months ago
Russia's APT28 used new malware in a recent phishing campaign
CERT-EU
7 months ago
CERT-UA Uncovers New Malware Wave Distributing OCEANMAP, MASEPIE, STEELHOOK
CERT-EU
5 months ago
Ubiquiti owners warned Moscow may build another botnet
CERT-EU
5 months ago
APT28 is recruiting Ubiquiti EdgeRouters into botnets
DARKReading
4 months ago
Russian Intelligence Targets Victims Worldwide in Rapid-Fire Cyberattacks
CERT-EU
4 months ago
APT28 Hacker Group Targeting Europe, Americas, Asia in Widespread Phishing Scheme | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker | National Cyber Security Consulting