PS1 is a loader that was used to deploy 64-bit backdoors in the CostaRicto campaign.[1]
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1059 | .001 | Command and Scripting Interpreter: PowerShell | |
| Enterprise | T1140 | Deobfuscate/Decode Files or Information | PS1 can use an XOR key to decrypt a PowerShell loader and payload binary.[1] | |
| Enterprise | T1105 | Ingress Tool Transfer | CostaBricks can download additional payloads onto a compromised host.[1] | |
| Enterprise | T1027 | .013 | Obfuscated Files or Information: Encrypted/Encoded File | PS1 is distributed as a set of encrypted files and scripts.[1] | 
| Enterprise | T1055 | .001 | Process Injection: Dynamic-link Library Injection | |
| ID | Name | Description | 
|---|---|---|
| C0004 | CostaRicto | During CostaRicto, threat actors used the 64-bit backdoor loader PS1.[1] |