Ttng

Malware updated 23 days ago (2024-11-29T14:03:26.098Z)
Download STIX
Preview STIX
TinyTurla-NG (TTNG) is a potent malware identified by Cisco Talos in partnership with CERT.NGO. TTNG is part of the arsenal used by the Turla APT, a notorious group of Russian state-sponsored actors known for their cyber espionage activities. This malicious software is designed to infiltrate systems, often undetected, and execute harmful actions such as stealing personal information or disrupting operations. The TTNG backdoor is akin to Turla's implant TinyTurla, showing similarities in their operational patterns. The command and control (C2) scripts associated with TTNG play a crucial role in the malware's operation. These scripts are deployed on compromised WordPress servers and are intended to deliver executables and administrative commands to infected systems. If an "id" is provided in the HTTP request to the C2 server, this is treated as communication with an implant like TTNG or TurlaPower-NG. The "id" parameter is the same variable passed by the TTNG and TurlaPower-NG implants during communication with the C2, which then creates a logging directory on the C2 server. Post-compromise, TTNG operators issue three sets of modular PowerShell commands: reconnaissance commands used to enumerate files in a directory specified by the operator. The malware uses a privilege elevation tool to run these PowerShell scripts. Besides TurlaPower-NG, another implant was found on infected systems, suggesting the use of Chisel as another means of persistent access. The output of a command executed on an infected endpoint by the TTNG backdoor is obtained and recorded into a file on disk by the C2, illustrating the depth of control the malware has over compromised systems.
Description last updated: 2024-05-05T02:39:59.552Z
What's your take? (Question 1 of 2)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Possible Aliases / Cluster overlaps
It's hard to track cluster overlaps and naming conventions between vendors, so here are some possible overlapping names / profiles you also may want to look at. Create a free account to see the source evidence for each alias, and help fix any errors.
Alias DescriptionVotes
TinyTurla is a possible alias for Ttng. TinyTurla is a form of malware, malicious software designed to infiltrate and damage computer systems without the user's knowledge. It can enter systems via suspicious downloads, emails, or websites, and once inside, it has the potential to steal personal information, disrupt operations, or hold dat
2
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Implant
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Associated Threat Actors
To see the evidence that has resulted in these threatActor associations, create a free account
Alias DescriptionAssociation TypeVotes
The Turla Threat Actor is associated with Ttng. Turla, a threat actor linked to Russia, is known for its sophisticated cyber espionage operations. The group has been associated with numerous high-profile attacks, often utilizing advanced backdoors and fileless malware for infiltration and persistence. Turla's tactics, techniques, and procedures (Unspecified
2
Source Document References
Information about the Ttng Malware was read from the documents corpus below. This display is limited to 20 results, create a free account to see more