Call stack spoofing explained using APT41 malware
Common Information
Type Value
UUID 84e6f858-9189-48c0-891f-bee2443e182d
Fingerprint ec15c91ac83a2abd
Analysis status DONE
Considered CTI value 1
Text language
Published Oct. 17, 2024, 12:56 p.m.
Added to db Oct. 17, 2024, 3:52 p.m.
Last updated Nov. 17, 2024, 6:54 p.m.
Headline Call stack spoofing explained using APT41 malware
Title Call stack spoofing explained using APT41 malware
Detected Hints/Tags/Attributes 17/1/10
RSS Feed
Details Id Enabled Feed title Url Added to db
Details 158 Malware Analysis, News and Indicators - Latest topics https://malware.news/latest.rss 2024-08-30 22:08
Attributes
Details Type #Events CTI Value
Details Domain 84
www.zscaler.com
Details Domain 20
labs.withsecure.com
Details File 82
kernelbase.dll
Details File 533
ntdll.dll
Details File 125
ntoskrnl.exe
Details File 380
notepad.exe
Details sha256 3
33fd050760e251ab932e5ca4311b494ef72cee157b20537ce773420845302e49
Details Threat Actor Identifier - APT 522
APT41
Details Url 3
https://www.zscaler.com/blogs/security-research/dodgebox-deep-dive-updated-arsenal-apt41-part-1
Details Url 3
https://labs.withsecure.com/publications/spoofing-call-stacks-to-confuse-edrs