Call stack spoofing explained using APT41 malware – CYBER GEEKS
Common Information
Type Value
UUID 46501eeb-ef9b-4df3-9b1c-d45c5273b16f
Fingerprint 4a27c130ec19d215
Analysis status DONE
Considered CTI value 1
Text language
Published Oct. 17, 2024, midnight
Added to db Oct. 18, 2024, 10:25 a.m.
Last updated Nov. 17, 2024, 6:54 p.m.
Headline Call stack spoofing explained using APT41 malware
Title Call stack spoofing explained using APT41 malware – CYBER GEEKS
Detected Hints/Tags/Attributes 17/1/10
RSS Feed
Details Id Enabled Feed title Url Added to db
Details 91 CYBER GEEKS https://cybergeeks.tech/feed/ 2024-08-30 22:08
Attributes
Details Type #Events CTI Value
Details Domain 84
www.zscaler.com
Details Domain 20
labs.withsecure.com
Details File 82
kernelbase.dll
Details File 533
ntdll.dll
Details File 125
ntoskrnl.exe
Details File 380
notepad.exe
Details sha256 3
33fd050760e251ab932e5ca4311b494ef72cee157b20537ce773420845302e49
Details Threat Actor Identifier - APT 522
APT41
Details Url 3
https://www.zscaler.com/blogs/security-research/dodgebox-deep-dive-updated-arsenal-apt41-part-1
Details Url 3
https://labs.withsecure.com/publications/spoofing-call-stacks-to-confuse-edrs