ThaiCERT    ETDA    MDES
Report
Search
Home > List all groups > List all tools > List all groups using tool SodomMain

Threat Group Cards: A Threat Actor Encyclopedia

Permanent link Tool: SodomMain

NamesSodomMain
SodomMain RAT
CategoryMalware
TypeReconnaissance, Backdoor, Info stealer
Description(Proofpoint) The SodomMain module is LookBack malware’s remote access Trojan module that can send and receive numerous commands indicative of its function as a RAT. The malware is delivered within the encoded data that is received by the SodomNormal module as part of its initial beacon response. It then runs within the SodomNormal module and uses its “send_data” function for C&C communications. The data is ultimately relayed to the GUP Proxy Tool and the C&C IP.

Noteworthy malware commands include:

• Get process listing
• Kill process
• Executes cmd[.] exe command
• Gets drive type
• Find files
• Read files
• Delete files
• Write to files
• Execute files
• Enumerate services
• Starts services
• Delete services
• Takes a screenshot of desktop
• Move/Click Mouse and take a screenshot
• Exit
• Removes self (libcurl[.] dll)
• Shutdown
• Reboot
Information<https://www.proofpoint.com/us/threat-insight/post/lookback-malware-targets-united-states-utilities-sector-phishing-attacks>

Last change to this tool card: 20 April 2020

Download this tool card in JSON format

Previous: Sodinokibi
Next: SodomNormal

All groups using tool SodomMain

ChangedNameCountryObserved

APT groups

 LookBack, TA410[Unknown]2019-Aug 2019 

1 group listed (1 APT, 0 other, 0 unknown)

Thailand Computer Emergency Response Team (ThaiCERT)
Electronic Transactions Development Agency

Follow us on

Facebook Twitter

Report incidents

Telephone +66 (0)2-123-1234
E-mail report@thaicert.or.th
PGP Download PGP key