Statements (29)
| Predicate | Object |
|---|---|
| gptkbp:instanceOf |
gptkb:malware
|
| gptkbp:abilities |
data exfiltration
command execution screenshot capture file manipulation keylogging |
| gptkbp:alsoKnownAs |
HYPERBRO
|
| gptkbp:C2Communication |
encrypted
|
| gptkbp:connectsTo |
Chinese cyber espionage
|
| gptkbp:deliveredBy |
phishing
malicious attachments |
| gptkbp:encryption |
gptkb:RC4
gptkb:AES |
| gptkbp:firstObserved |
2016
|
| gptkbp:notable_campaign |
2017 Middle East attacks
attacks on technology companies |
| gptkbp:operatingSystem |
gptkb:Windows
|
| gptkbp:persistenceMechanism |
registry modification
scheduled tasks |
| gptkbp:programmingLanguage |
gptkb:C++
|
| gptkbp:supportsProtocol |
HTTP(S)
custom protocol |
| gptkbp:target |
private sector organizations
government organizations |
| gptkbp:type |
gptkb:Trojan
|
| gptkbp:usedBy |
gptkb:APT27
|
| gptkbp:bfsParent |
gptkb:APT27
|
| gptkbp:bfsLayer |
8
|
| https://www.w3.org/2000/01/rdf-schema#label |
HyperBro
|