Welcome back to our Triage Thursday blog series! We’re excited to share this week’s detection updates with you. In these quick posts, we highlight the latest malware families detections that have been added.
New Families This Week
- Added detection and extraction for Oreshki, Windows stealer
- Oreshki sample:
- Added detection and extraction for C0deStealer, Windows stealer
- C0deStealer sample:
- Added detection for VoidLink, Linux backdoor
- VoidLink sample:
- Add detection for CastleLoader, Windows loader
- CastleLoader sample:
- Added detection for MystRodX aka SilentRaid, linux backdoor
- MystRodX sample:
- Added new detection for RushDrop aka ChronosRAT, linux loader
- RushDrop sample:
- Added detection for FSBStealer, Windows stealer
- FSBStealer sample:
- Added detection for Citadel family, Windows trojan
- Citadel sample:
- Added detection for TrapStealer packed with PyInstaller, Windows stealer
- TrapStealer sample:
- Added detection for Qealler, Java based stealer
- Qealler sample:
Updates for Existing Families
- Update detection for the latest variants of MaskGramStealer, Windows stealer
- MaskGramStealer sample:
- Update detection for ChromElevator, Windows hacktool
- ChromElevator sample:
- Update detection for SantaStealer, Windows stealer
- SantaStealer sample:
If you have any feedback, questions, or issues about Triage feel free to reach out to us any time - we do our best to respond to all feedback but even if we can’t get back to you straight away your files will go into our list of things to review and help us prioritize tasks.
You can find us directly through the website, or using the Feedback option on an analysis report page.
Not signed up yet? Head over to tria.ge to register for a free account.