Names | Crutch | |
Category | Malware | |
Type | Reconnaissance, Backdoor, Exfiltration | |
Description | (ESET) We were able to capture some of the commands sent by the operators to several Crutch v3 instances, which is helpful to understand the goal of the operation. The operators were mainly doing reconnaissance, lateral movement and espionage. The main malicious activity is the staging, compression and exfiltration of documents and various files, as shown in Figure 1. These are commands manually executed by the operators, thus not showing the automated collection of documents by the drive monitor component described in a later section. | |
Information | <https://www.welivesecurity.com/2020/12/02/turla-crutch-keeping-back-door-open/> |
Last change to this tool card: 06 January 2021
Download this tool card in JSON format
Previous: CrossWalk
Next: Cryptcat
Changed | Name | Country | Observed | ||
APT groups | |||||
Turla, Waterbug, Venomous Bear | ![]() | 1996-Jun 2020 |
1 group listed (1 APT, 0 other, 0 unknown)
Thailand Computer Emergency Response Team (ThaiCERT) Follow us on![]() ![]() |
Report incidents |
|
![]() |
+66 (0)2-123-1234 | |
![]() |
report@thaicert.or.th | |
![]() |
Download PGP key |