SYMBOLCOMMON_NAMEaka. SYNONYMS

El Machete  (Back to overview)

aka: APT-C-43, G0095, Machete, machete-apt

El Machete is one of these threats that was first publicly disclosed and named by Kaspersky here. We’ve found that this group has continued to operate successfully, predominantly in Latin America, since 2014. All attackers simply moved to new C2 infrastructure, based largely around dynamic DNS domains, in addition to making minimal changes to the malware in order to evade signature-based detection.


Associated Families
py.lokirat py.pyark win.elmachete_dropper_2022

References
2022-03-31Check Point Research
State-sponsored Attack Groups Capitalise on Russia-Ukraine War for Cyber Espionage
Loki RAT El Machete APT Backdoor Dropper Lyceum .NET DNS Backdoor Lyceum .NET TCP Backdoor Lyceum Golang HTTP Backdoor
2020-09-25360 Total Securitykate
APT-C-43 steals Venezuelan military secrets to provide intelligence support for the reactionaries - HpReact campaign
PyArk El Machete
2019-09-13MITREMITRE ATT&CK
Machete
El Machete
2019-01-01Council on Foreign RelationsCyber Operations Tracker
Machete
El Machete
2017-03-22CylanceThreat Research Team
El Machete's Malware Attacks Cut Through LATAM
El Machete
2017-03-22CylanceCylance Threat Research Team
El Machete's Malware Attacks Cut Through LATAM
Machete El Machete
2014-08-20Kaspersky LabsGReAT
“El Machete”
Machete El Machete

Credits: MISP Project