SYMBOL | COMMON_NAME | aka. SYNONYMS |
Water Gamayun exploits the MSC EvilTwin zero-day vulnerability to compromise systems and exfiltrate data, utilizing custom payloads and advanced data exfiltration techniques. Their arsenal includes backdoors like SilentPrism and DarkWisp, as well as information stealers such as Stealc and Rhadamanthys. They employ delivery methods like provisioning malicious payloads through signed Microsoft Installer files and leveraging LOLBins to maintain persistence and control over infected systems. Comprehensive analysis of their command-and-control infrastructure reveals sophisticated evasion techniques and dynamic control capabilities.
There are currently no families associated with this actor.
2025-03-28
⋅
Trend Micro
⋅
A Deep Dive into Water Gamayun’s Arsenal and Infrastructure DarkWisp SilentPrism Kematian Stealer Rhadamanthys Stealc Water Gamayun |