Pisloader is a malware family that is notable due to its use of DNS as a C2 protocol as well as its use of anti-analysis tactics. It has been used by APT18 and is similar to another malware family, HTTPBrowser, that has been used by the group. [1]

ID: S0124
Platforms: Windows

Version: 1.0

Techniques Used

EnterpriseT1059Command-Line InterfacePisloader uses cmd.exe to set the Registry Run key value. It also has a command to spawn a command shell.[1]
EnterpriseT1132Data EncodingResponses from the Pisloader C2 server are base32-encoded.[1]
EnterpriseT1083File and Directory DiscoveryPisloader has commands to list drives on the victim machine and to list file information for a given directory.[1]
EnterpriseT1027Obfuscated Files or InformationPisloader obfuscates files by splitting strings into smaller sub-strings and including "garbage" strings that are never used. The malware also uses return-oriented programming (ROP) technique and single-byte XOR to obfuscate data.[1]
EnterpriseT1060Registry Run Keys / Startup FolderPisloader establishes persistence via a Registry Run key.[1]
EnterpriseT1105Remote File CopyPisloader has a command to upload a file to the victim machine.[1]
EnterpriseT1071Standard Application Layer ProtocolPisloader uses DNS as its C2 protocol.[1]
EnterpriseT1082System Information DiscoveryPisloader has a command to collect victim system information, including the system name and OS version.[1]
EnterpriseT1016System Network Configuration DiscoveryPisloader has a command to collect the victim's IP address.[1]


Groups that use this software: