Spark (Malware Family) By Fraunhofer FKIE Archived: 2026-04-05 13:15:57 UTC win.spark (Back to overview) Spark Actor(s): Molerats There is no description at this point. References 2022-01-20 ⋅ Zscaler ⋅ Sahil Antil, Sudeep Singh New espionage attack by Molerats APT targeting users in the Middle East Spark 2020-12-09 ⋅ Cybereason ⋅ Cybereason Nocturnus New Malware Arsenal Abusing Cloud Platforms in Middle East Espionage Campaign DropBook MoleNet Quasar RAT SharpStage Spark 2020-12-09 ⋅ Cybereason ⋅ Cybereason Nocturnus Team MOLERATS IN THE CLOUD: New Malware Arsenal Abuses Cloud Platforms in Middle East Espionage Campaign DropBook JhoneRAT Molerat Loader Pierogi Quasar RAT SharpStage Spark 2020-03-03 ⋅ Palo Alto Networks Unit 42 ⋅ Alex Hinchliffe, Bryan Lee, Robert Falcone Molerats Delivers Spark Backdoor to Government and Telecommunications Organizations Downeks JhoneRAT Molerat Loader Spark 2020-02-13 ⋅ Cybereason ⋅ Cybereason Nocturnus New Cyber Espionage Campaigns Targeting Palestinians - Part 1: The Spark Campaign Spark There is no Yara-Signature yet. Source: https://malpedia.caad.fkie.fraunhofer.de/details/win.spark https://malpedia.caad.fkie.fraunhofer.de/details/win.spark Page 1 of 1