Names | Jumpall | |
Category | Malware | |
Type | Dropper | |
Description | (FireEye) JUMPALL is a dropper that has been observed dropping variants of the HighNoon, ZXShell, and PlugX code families attributed to APT17 and APT41. | |
Information | <https://paper.bobylive.com/Security/APT_Report/APT-41.pdf> | |
Malpedia | <https://malpedia.caad.fkie.fraunhofer.de/details/win.jumpall> |
Last change to this tool card: 20 April 2020
Download this tool card in JSON format
Changed | Name | Country | Observed | ||
APT groups | |||||
APT 17, Deputy Dog, Elderwood, Sneaky Panda | ![]() | 2009-Sep 2017 | |||
APT 41 | ![]() | 2012-Aug 2020 | ![]() |
2 groups listed (2 APT, 0 other, 0 unknown)
Thailand Computer Emergency Response Team (ThaiCERT) Follow us on![]() ![]() |
Report incidents |
|
![]() |
+66 (0)2-123-1234 | |
![]() |
report@thaicert.or.th | |
![]() |
Download PGP key |