Names | CARROTBAT | |
Category | Malware | |
Type | Dropper | |
Description | (Palo Alto) In total, 29 unique CARROTBAT samples have been identified to date, containing a total of 12 confirmed unique decoy documents. These samples began appearing in March of this year, with the majority of activity taking place within the past 3 months. The payloads vary, as earlier instances delivered Syscon, while newer instances are delivering the previously reported Oceansalt malware family. CARROTBAT and their associated payloads constitute a campaign that we are dubbing ‘Fractured Block’. | |
Information | <https://unit42.paloaltonetworks.com/unit42-the-fractured-block-campaign-carrotbat-malware-used-to-deliver-malware-targeting-southeast-asia/> | |
Malpedia | <https://malpedia.caad.fkie.fraunhofer.de/details/win.carrotbat> | |
AlienVault OTX | <https://otx.alienvault.com/browse/pulses?q=tag:carrotbat> |
Last change to this tool card: 29 April 2020
Download this tool card in JSON format
Previous: CARROTBALL
Next: Casper
Changed | Name | Country | Observed | ||
APT groups | |||||
![]() | Reaper, APT 37, Ricochet Chollima, ScarCruft | ![]() | 2012-Dec 2020 ![]() | ![]() |
1 group listed (1 APT, 0 other, 0 unknown)
Thailand Computer Emergency Response Team (ThaiCERT) Follow us on![]() ![]() |
Report incidents |
|
![]() |
+66 (0)2-123-1234 | |
![]() |
report@thaicert.or.th | |
![]() |
Download PGP key |