5 articles Hacktool

HackTool.Win32.NppSpy

Overview Type: Hacktool Destruction Level: High Prevalence: Moderate   Malware Name(s) (Padvish) HackTool.Win32.NppSpy (Avira) TR/PSW.Agent.zmiws (Kaspersky)Trojan-PSW.Win32.Lognot.e What is HackTool? Hacktools are tools designed to facilitate intrusion. These tools can be used by an intruder to receive data from the victim organization’s network. These tools are commonly used to retrieve credentials information of sensitive victim servers.…

HackTool.Win32.ASPXSpy

Overview Type: Hacktool Destruction Level: High Prevalence: Low   Malware name(s) HackTool.Win32.ASPXSpy (Padvish) HackTool.Win32.ASPXSpy (Eset) Backdoor:MSIL/AspxSpy.A (Microsoft) What is a hackTool? Hacktools are tools designed to facilitate intrusion. These tools can be used by an intruder to recieve data from the victim organization’s network. These tools are commonly used to retrieve the credentials of sensitive…

Hacktool.Win32.BackdoorDiplomacy

Overview Type: HackTool Destruction Level: High Prevalence: Moderate Malware Name(s) Hacktool.Win32.BackdoorDiplomacy (Padvish ) Win32/Korplug.A (Eset) Backdoor.Win32.Gulpix.ab (Kaspersky) Trojan:Win32/Plugx.B (Microsoft ) What is HackTool? Hacktools are tools designed to facilitate intrusion. These tools can be used by an intruder to siphon data from the victim organization’s network. These tools are commonly used to siphon the validation…

HackTool.Win32.APT- PS

Technical details 1.1 Modules and malware operation sequences This malware includes many modules, including executable programs and various scripts, each of which has its small task. The following is a list of malware files with a brief description of how they work. File Name Description HackTool.Win32.PS_Backdoor the malware Backdoor file is used to execute the…

Hacktool.Win32.Xwo.a

Overview Type: Hacktool Destruction Level: High Prevalence: Low   What is Hacktool? Hacktools are tools designed to facilitate intrusion. These tools can be used by a hacker to siphon data from the victim organization’s network. These tools are commonly used to retrieve the validation information of sensitive victim servers. For example, a hacker can use…