A Look at the Nim-based Campaign Using Microsoft Word Docs to Impersonate the Nepali Government - Netskope [Friday, December 29, 2023]

A Look at the Nim-based Campaign Using Microsoft Word Docs to Impersonate the Nepali Government - Netskope [Friday, December 29, 2023]
Report

A Look at the Nim-based Campaign Using Microsoft Word Docs to Impersonate the Nepali Government - Netskope

Description :
Netskope recently analyzed a malicious backdoor written in Nim, which is a relatively new programming language. Netskope Threat labs has observed an increase in Nim-based malware over the past year and expects Nim-based malware to become more popular as attackers continue to modify existing Nim-based samples.

Published Created Modified
2023-12-29 21:59:11 2023-12-29 21:59:11 2023-12-29 22:17:53

Tags

Indicators

IPv4s :
  • 5.181.20.102
Domains :
  • mx1.nepal.govnp.org
  • dns.govnp.org
  • nitc.govnp.org
  • mail.mofa.govnp.org
Hashes :
  • 88fa16ec5420883a9c9e4f952634494d95f06f426e0a600a8114f69a6127347f
  • b5c001cbcd72b919e9b05e3281cc4e4914fee0748b3d81954772975630233a6e
MITRE ATT&CK Techniques :

External References

You can download the txt file containing the indicators by clicking on the button below:

About the author
Julien B.

Securitricks

Up-to-Date Cybersecurity Insights & Malware Reports

Securitricks

Great! You’ve successfully signed up.

Welcome back! You've successfully signed in.

You've successfully subscribed to Securitricks.

Success! Check your email for magic link to sign-in.

Success! Your billing info has been updated.

Your billing was not updated.