Check out the results from our first round of ATT&CK Evaluations at attackevals.mitre.org!

TEXTMATE

TEXTMATE is a second-stage PowerShell backdoor that is memory-resident. It was observed being used along with POWERSOURCE in February 2017. [1]

ID: S0146
Aliases: TEXTMATE, DNSMessenger
Type: MALWARE
Platforms: Windows

Version: 1.0

Alias Descriptions

NameDescription
TEXTMATE[1]
DNSMessengerBased on similar descriptions of functionality, it appears S0146, as named by FireEye, is the same as Stage 4 of a backdoor named DNSMessenger by Cisco's Talos Intelligence Group. However, FireEye appears to break DNSMessenger into two parts: S0145 and S0146. [2] [1]

Techniques Used

DomainIDNameUse
EnterpriseT1059Command-Line InterfaceTEXTMATE executes cmd.exe to provide a reverse shell to adversaries.[1][2]
EnterpriseT1071Standard Application Layer ProtocolTEXTMATE uses DNS TXT records for C2.[1]

Groups

Groups that use this software:

FIN7

References