ThaiCERT    ETDA    MDES
Report
Search
Home > List all groups > List all tools > List all groups using tool Crutch

Threat Group Cards: A Threat Actor Encyclopedia

Permanent link Tool: Crutch

NamesCrutch
CategoryMalware
TypeReconnaissance, Backdoor, Exfiltration
Description(ESET) We were able to capture some of the commands sent by the operators to several Crutch v3 instances, which is helpful to understand the goal of the operation. The operators were mainly doing reconnaissance, lateral movement and espionage.
The main malicious activity is the staging, compression and exfiltration of documents and various files, as shown in Figure 1. These are commands manually executed by the operators, thus not showing the automated collection of documents by the drive monitor component described in a later section.
Information<https://www.welivesecurity.com/2020/12/02/turla-crutch-keeping-back-door-open/>
Malpedia<https://malpedia.caad.fkie.fraunhofer.de/details/win.crutch>

Last change to this tool card: 23 April 2021

Download this tool card in JSON format

Previous: CrossWalk
Next: Crypta

All groups using tool Crutch

ChangedNameCountryObserved

APT groups

 Turla, Waterbug, Venomous BearRussia1996-Feb 2021 

1 group listed (1 APT, 0 other, 0 unknown)

Thailand Computer Emergency Response Team (ThaiCERT)
Electronic Transactions Development Agency

Follow us on

Facebook Twitter

Report incidents

Telephone +66 (0)2-123-1234
E-mail report@thaicert.or.th
PGP Download PGP key