PowerStallion

PowerStallion is a lightweight PowerShell backdoor used by Turla, possibly as a recovery access tool to install other backdoors.[1]

ID: S0393
Type: MALWARE
Platforms: Windows
Version: 1.1
Created: 21 June 2019
Last Modified: 30 March 2020

Techniques Used

Domain ID Name Use
Enterprise T1059 .001 Command and Scripting Interpreter: PowerShell

PowerStallion uses PowerShell loops to iteratively check for available commands in its OneDrive C2 server.[1]

Enterprise T1070 .006 Indicator Removal on Host: Timestomp

PowerStallion modifies the MAC times of its local log files to match that of the victim's desktop.ini file.[1]

Enterprise T1027 Obfuscated Files or Information

PowerStallion uses a XOR cipher to encrypt command output written to its OneDrive C2 server.[1]

Enterprise T1057 Process Discovery

PowerStallion has been used to monitor process lists.[1]

Enterprise T1102 .002 Web Service: Bidirectional Communication

PowerStallion uses Microsoft OneDrive as a C2 server via a network drive mapped with net use.[1]

Groups That Use This Software

ID Name References
G0010 Turla

[1]

References