Update Date
11/16/2023

Class: Trojan-Proxy

Trojan-Proxy programs are designed to give malicious users access to a variety of Internet resources via victim computers. These malicious programs are typically used to send out mass spam mailings.

Read more

Platform: Win32

Win32 is an API on Windows NT-based operating systems (Windows XP, Windows 7, etc.) that supports execution of 32-bit applications. One of the most widespread programming platforms in the world.

Family: Qukart

No family description

Examples

022DEA106879D7F5CDB82344F2020AFB
50CFE871195BC33DBF69D66532035D5E
E95F2514CDF5A599B8E6049F212DC293
8B211A78E4D55E164D1305129ABBF448
5056191CEED05A6BDB4D571215927B0B

Tactics and Techniques: Mitre*

TA0005
Defense Evasion

Adversaries may attempt to manipulate features of their artifacts to make them appear legitimate or benign to users and/or security tools. Masquerading occurs when the name or location of an object, legitimate or malicious, is manipulated or abused for the sake of evading defenses and observation. This may include manipulating file metadata, tricking users into misidentifying the file type, and giving legitimate task or service names.


T1036
Masquerading

Adversaries may attempt to manipulate features of their artifacts to make them appear legitimate or benign to users and/or security tools. Masquerading occurs when the name or location of an object, legitimate or malicious, is manipulated or abused for the sake of evading defenses and observation. This may include manipulating file metadata, tricking users into misidentifying the file type, and giving legitimate task or service names.


* © 2025 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation.

Kaspersky Next
Let’s go Next: redefine your business’s cybersecurity
Learn more
New Kaspersky!
Your digital life deserves complete protection!
Learn more
Confirm changes?
Your message has been sent successfully.