Threat Group Cards: A Threat Actor Encyclopedia Archived: 2026-04-05 17:36:09 UTC Home > List all groups > List all tools > List all groups using tool LastConn Tool: LastConn Names LastConn Category Malware Type Backdoor, Info stealer, Downloader Description (Proofpoint) Based on Proofpoint visibility, the campaigns occurred on a weekly basis throughout early 2021 before abruptly stopping in March for a two-month hiatus. TA402, also known as Molerats and GazaHackerTeam, resumed email threat campaigns in early June 2021 with continued use of malware Proofpoint dubbed LastConn. Researchers assess with high confidence LastConn is an updated version of SharpStage malware first reported by Cybereason in December 2020. LastConn malware is specifically targeted at computers with an Arabic language pack installed to ensure it only infects specific targets. It uses Dropbox for all command and control (C2) capabilities and infrastructure. Proofpoint researchers assess LastConn is very actively developed and maintained malware. It features multiple capabilities that attempt to prevent both automated and manual malware analysis. Information AlienVault OTX Last change to this tool card: 10 August 2021 Download this tool card in JSON format All groups using tool LastConn Changed Name Country Observed APT groups https://apt.etda.or.th/cgi-bin/listgroups.cgi?u=8b102e75-19fe-4e04-98f7-4260ce4b4b4e Page 1 of 2 Molerats, Extreme Jackal, Gaza Cybergang [Gaza] 2012-Jul 2023   1 group listed (1 APT, 0 other, 0 unknown) Source: https://apt.etda.or.th/cgi-bin/listgroups.cgi?u=8b102e75-19fe-4e04-98f7-4260ce4b4b4e https://apt.etda.or.th/cgi-bin/listgroups.cgi?u=8b102e75-19fe-4e04-98f7-4260ce4b4b4e Page 2 of 2