Names | Spark | |
Category | Malware | |
Type | Reconnaissance, Backdoor, Keylogger, Info stealer, Downloader | |
Description | (Cybereason) The Spark backdoor allows the attackers to: • Collect information about the infected machine. • Encrypt the collected data and send it to the attackers over the HTTP protocol. • Download additional payloads. • Log keystrokes. • Record audio using the computer’s microphone. • Execute commands on the infected machine. The creators of the Spark backdoor use a few techniques that are intended to keep the backdoor under-the-radar, including: • Packing the payloads with the Enigma packer. • Checking for antivirus and other security products using WMI. • Validating Arabic keyboard and language settings on the infected machine. | |
Information | <https://www.cybereason.com/blog/new-cyber-espionage-campaigns-targeting-palestinians-part-one> | |
Malpedia | <https://malpedia.caad.fkie.fraunhofer.de/details/win.spark> |
Last change to this tool card: 20 April 2020
Download this tool card in JSON format
Changed | Name | Country | Observed | ||
APT groups | |||||
Molerats, Extreme Jackal, Gaza Cybergang | [Gaza] | 2012-Oct 2020 |
1 group listed (1 APT, 0 other, 0 unknown)
Thailand Computer Emergency Response Team (ThaiCERT) Follow us on![]() ![]() |
Report incidents |
|
![]() |
+66 (0)2-123-1234 | |
![]() |
report@thaicert.or.th | |
![]() |
Download PGP key |