ThaiCERT    ETDA    MDES
Report
Search
Home > List all groups > List all tools > List all groups using tool WINDSHIELD

Threat Group Cards: A Threat Actor Encyclopedia

Permanent link Tool: WINDSHIELD

NamesWINDSHIELD
Cuegoe
CategoryMalware
TypeReconnaissance, Backdoor, Info stealer, Downloader
Description(FireEye) • Command and control (C2) communications via TCP raw sockets
• Four configured C2s and six configured ports – randomly-chosen C2/port for communications
• Registry manipulation
• Get the current module's file name
• Gather system information including registry values, user name, computer name, and current code page
• File system interaction including directory creation, file deletion, reading, and writing files
• Load additional modules and execute code
• Terminate processes
• Anti-disassembly
Information<https://www.fireeye.com/blog/threat-research/2017/05/cyber-espionage-apt32.html>
<http://blog.malwaremustdie.org/2014/08/another-country-sponsored-malware.html>
<https://www.eff.org/deeplinks/2014/01/vietnamese-malware-gets-personal>
MITRE ATT&CK<https://attack.mitre.org/software/S0155/>
Malpedia<https://malpedia.caad.fkie.fraunhofer.de/details/win.cuegoe>

Last change to this tool card: 13 May 2020

Download this tool card in JSON format

Previous: Windows Credentials Editor
Next: WindTail

All groups using tool WINDSHIELD

ChangedNameCountryObserved

APT groups

XAPT 32, OceanLotus, SeaLotusVietnam2013-Dec 2020 HOTX

1 group listed (1 APT, 0 other, 0 unknown)

Thailand Computer Emergency Response Team (ThaiCERT)
Electronic Transactions Development Agency

Follow us on

Facebook Twitter

Report incidents

Telephone +66 (0)2-123-1234
E-mail report@thaicert.or.th
PGP Download PGP key