TEXTMATE
TEXTMATE is a second-stage PowerShell backdoor that is memory-resident. It was observed being used along with POWERSOURCE in February 2017. [1]
ID: S0146
Aliases: TEXTMATE, DNSMessenger
Type: MALWARE
Platforms: Windows
Version: 1.0
Alias Descriptions
Name | Description |
---|---|
TEXTMATE | [1] |
DNSMessenger | Based on similar descriptions of functionality, it appears S0146, as named by FireEye, is the same as Stage 4 of a backdoor named DNSMessenger by Cisco's Talos Intelligence Group. However, FireEye appears to break DNSMessenger into two parts: S0145 and S0146. [2] [1] |
Techniques Used
Domain | ID | Name | Use |
---|---|---|---|
Enterprise | T1059 | Command-Line Interface | TEXTMATE executes cmd.exe to provide a reverse shell to adversaries.[1][2] |
Enterprise | T1071 | Standard Application Layer Protocol | TEXTMATE uses DNS TXT records for C2.[1] |
Groups
Groups that use this software:
FIN7