SOFTWARE
SOFTWARE
A-B
C-D
E-F
G-H
I-J
K-L
M-N
O-P
Q-R
S-T
U-V
W-X
PowerStallion
PowerStallion is a lightweight PowerShell backdoor used by Turla, possibly as a recovery access tool to install other backdoors.[1]
ID: S0393
Type: MALWARE
Platforms: Windows
Version: 1.1
Created: 21 June 2019
Last Modified: 30 March 2020
Techniques Used
Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1059 | .001 | Command and Scripting Interpreter: PowerShell |
PowerStallion uses PowerShell loops to iteratively check for available commands in its OneDrive C2 server.[1] |
Enterprise | T1070 | .006 | Indicator Removal on Host: Timestomp |
PowerStallion modifies the MAC times of its local log files to match that of the victim's desktop.ini file.[1] |
Enterprise | T1027 | Obfuscated Files or Information |
PowerStallion uses a XOR cipher to encrypt command output written to its OneDrive C2 server.[1] |
|
Enterprise | T1057 | Process Discovery |
PowerStallion has been used to monitor process lists.[1] |
|
Enterprise | T1102 | .002 | Web Service: Bidirectional Communication |
PowerStallion uses Microsoft OneDrive as a C2 server via a network drive mapped with |
Groups That Use This Software
ID | Name | References |
---|---|---|
G0010 | Turla |
References
×