Seduploader

Malware updated 4 months ago (2024-05-04T23:18:12.658Z)
Download STIX
Preview STIX
Seduploader is a type of malware, a harmful program designed to exploit and damage computer systems. This malware can infiltrate systems through various channels such as suspicious downloads, emails, or websites, often unbeknownst to the user. Once inside a system, it can steal personal information, disrupt operations, or even hold data hostage for ransom. The payload features of Seduploader are similar to its previous versions, but in recent attacks, there's no evidence to suggest that the previously used tool, SofacyCarberp (Seduploader), was involved. The latest variant of Seduploader has been found to be dropped and executed by Visual Basic for Applications (VBA). Unlike previous campaigns carried out by this actor, this new version does not contain privilege escalation; instead, it simply executes the payload and sets up persistence mechanisms. Open Source Snort Subscriber Rule Set customers can stay updated by downloading the most recent rule pack available for purchase on Snort.org. In terms of functionality, Seduploader boasts several features including screenshot capture using the GDI API, data/configuration exfiltration, execution of code, and file downloading. The Command & Control (CC) of the analyzed sample is myinvestgroup[.]com. The key in our version is: key=b"\x08\x7A\x05\x04\x60\x7c\x3e\x3c\x5d\x0b\x18\x3c\x55\x64" and the MUTEX name is different too: FG00nxojVs4gLBnwKc7HhmdK0h. The IOCs Files Office Documents and Seduploader Dropper have also been identified and analyzed.
Description last updated: 2024-05-04T22:17:58.067Z
Aliases We are not currently tracking any aliases
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Source Document References
Information about the Seduploader Malware was read from the documents corpus below. This display is limited to 20 results, create a free account to see more
PreviewSource LinkCreatedAtTitle
MITRE
2 years ago
Sofacy Uses DealersChoice to Target European Government Agency
MITRE
2 years ago
“Cyber Conflict” Decoy Document Used In Real Cyber Conflict