Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

OSINT - MM Core In-Memory Backdoor Returns as "BigBoss" and "SillyGoose"

0
Low
Published: Thu Jan 05 2017 (01/05/2017, 00:00:00 UTC)
Source: CIRCL
Vendor/Project: misp-galaxy
Product: tool

Description

OSINT - MM Core In-Memory Backdoor Returns as "BigBoss" and "SillyGoose"

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 07/02/2025, 18:10:35 UTC

Technical Analysis

The threat described involves the return of an in-memory backdoor malware family known as "MM Core," which has resurfaced under the aliases "BigBoss" and "SillyGoose." In-memory backdoors are a class of malware that reside primarily in volatile memory rather than on disk, making them more difficult to detect and analyze using traditional file-based antivirus or endpoint detection systems. The MM Core backdoor is designed to maintain stealthy persistence on compromised systems, allowing attackers to execute arbitrary commands, exfiltrate data, or establish further footholds without leaving persistent artifacts on the file system. The reappearance of this malware under new names suggests ongoing development or reuse by threat actors, potentially indicating a continued interest in leveraging this tool for targeted intrusions. Although the provided information lacks detailed technical specifics such as infection vectors, command and control mechanisms, or payload capabilities, the classification as an in-memory backdoor implies significant stealth and control capabilities. The threat level and analysis scores (3 and 2 respectively) suggest moderate concern but limited public technical data. The absence of known exploits in the wild and the low severity rating from the source may indicate limited current impact or deployment, but the stealthy nature of in-memory backdoors warrants attention.

Potential Impact

For European organizations, the presence of an in-memory backdoor like MM Core (BigBoss/SillyGoose) poses risks primarily related to confidentiality and integrity. Such malware can enable attackers to bypass traditional detection methods, maintain long-term access, and conduct espionage or data theft operations. Critical sectors such as finance, government, telecommunications, and critical infrastructure could be targeted to extract sensitive information or disrupt operations. The stealthy nature of the malware complicates incident response and forensic investigations, potentially allowing attackers to remain undetected for extended periods. While the current reported severity is low and no active exploits are known, the evolving threat landscape and the malware's persistence capabilities mean that European organizations should remain vigilant, especially those with high-value assets or strategic importance.

Mitigation Recommendations

Given the stealthy, in-memory nature of this backdoor, mitigation should focus on advanced detection and prevention strategies beyond traditional signature-based antivirus. Recommendations include: 1) Deploy endpoint detection and response (EDR) solutions capable of monitoring memory and behavioral anomalies to detect suspicious in-memory activities. 2) Implement strict application whitelisting and privilege management to limit the execution of unauthorized code and reduce the attack surface. 3) Conduct regular memory forensics and threat hunting exercises to identify unusual processes or network connections indicative of backdoor activity. 4) Maintain up-to-date threat intelligence feeds to recognize emerging variants or indicators of compromise related to MM Core or its aliases. 5) Enforce network segmentation and monitor outbound traffic for anomalous patterns that may indicate command and control communications. 6) Educate security teams on the characteristics of in-memory threats and incorporate these into incident response playbooks. These measures go beyond generic advice by emphasizing memory-focused detection, proactive threat hunting, and network monitoring tailored to stealthy backdoors.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Threat Level
3
Analysis
2
Original Timestamp
1483873066

Threat ID: 682acdbdbbaf20d303f0b922

Added to database: 5/19/2025, 6:20:45 AM

Last enriched: 7/2/2025, 6:10:35 PM

Last updated: 3/25/2026, 3:08:50 AM

Views: 64

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses