Peppy

Malware updated 9 months ago (2024-11-29T13:53:46.381Z)
Download STIX
Preview STIX
Peppy is a malicious software (malware) that has been identified as part of a broader cyber threat landscape. The malware, which is a Python-based Remote Access Trojan (RAT), was discovered during an analysis of the registration information of several Trojan command and control domains used by ProjectM, including Andromeda, Crimson, and Peppy. This malware can infiltrate your system through suspicious downloads, emails, or websites and once inside, it can steal personal information, disrupt operations, or even hold your data hostage for ransom. The Andromeda samples were found to be delivering Peppy Trojans using undisguised domains. These Trojans utilized the previously observed ProjectM domain "bbmdroid.com" as a Command and Control (C2) server. Unit 42 observed this domain hosting several ProjectM tools, including identical Andromeda and Peppy samples that had previously used bbmdroid[.]com as a C2. These samples were hosted at "/est/estma.exe" and "/est/controller.exe" respectively. Furthermore, the group primarily targets military organizations, typically compromising them with Office documents armed with malicious VBA and open-source malware like Peppy RAT and CrimsonRAT. The Operation Transparent Tribe report by Darien Huss of Proofpoint provides a comprehensive analysis of the various tools used by this group, including Crimson and Peppy and their associated infrastructure. The actors have access to a sizeable toolset of Trojans, including custom developed tools called Crimson and Peppy, along with off-the-shelf remote administration tools (RATs) and downloaders, such as DarkComet and Bozok. Over the years, they have also been observed using other custom .NET malware, including a .NET RAT known as Crimson RAT.
Description last updated: 2024-05-05T04:07:11.267Z
What's your take? (Question 1 of 0)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Possible Aliases / Cluster overlaps
It's hard to track cluster overlaps and naming conventions between vendors, so here are some possible overlapping names / profiles you also may want to look at. Create a free account to see the source evidence for each alias, and help fix any errors.
Alias DescriptionVotes
Crimson is a possible alias for Peppy. Crimson is a malware used in various cyber-espionage campaigns, most notably in Operation Crimson Palace. This operation has been active since March 2023, with heightened activity observed in 2024. It is a concerted effort by three Chinese Advanced Persistent Threat (APT) groups targeting Southeast
2
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Source Document References
Information about the Peppy Malware was read from the documents corpus below. This display is limited to 20 results, create a free account to see more