|
gptkbp:instanceOf
|
gptkb:malware
|
|
gptkbp:abilities
|
credential theft
screenshot capture
remote command execution
file exfiltration
keylogging
system information collection
clipboard monitoring
|
|
gptkbp:alsoKnownAs
|
gptkb:Zegost
|
|
gptkbp:associatedWith
|
gptkb:Chinese_threat_actors
gptkb:APT10
|
|
gptkbp:category
|
gptkb:cyber_espionage_tool
|
|
gptkbp:detects
|
various antivirus vendors
|
|
gptkbp:developedBy
|
gptkb:China
|
|
gptkbp:distributedBy
|
phishing emails
malicious attachments
exploit kits
|
|
gptkbp:firstObserved
|
2011
|
|
gptkbp:notable_campaign
|
attacks on government organizations
attacks on critical infrastructure
attacks on private sector companies
|
|
gptkbp:persistenceMechanism
|
registry modification
scheduled tasks
|
|
gptkbp:platform
|
gptkb:Windows
|
|
gptkbp:supportsProtocol
|
gptkb:FTP
gptkb:HTTP
SMTP
|
|
gptkbp:type
|
gptkb:information_stealer
|
|
gptkbp:usedFor
|
espionage
data theft
|
|
gptkbp:usesMalware
|
Zegost family
|
|
gptkbp:bfsParent
|
gptkb:Operation_Zegost
|
|
gptkbp:bfsLayer
|
7
|
|
https://www.w3.org/2000/01/rdf-schema#label
|
Zegost malware
|