PS1 is a loader that was used to deploy 64-bit backdoors in the CostaRicto campaign.[1]
Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1059 | .001 | Command and Scripting Interpreter: PowerShell | |
Enterprise | T1140 | Deobfuscate/Decode Files or Information |
PS1 can use an XOR key to decrypt a PowerShell loader and payload binary.[1] |
|
Enterprise | T1105 | Ingress Tool Transfer |
CostaBricks can download additional payloads onto a compromised host.[1] |
|
Enterprise | T1027 | .013 | Obfuscated Files or Information: Encrypted/Encoded File |
PS1 is distributed as a set of encrypted files and scripts.[1] |
Enterprise | T1055 | .001 | Process Injection: Dynamic-link Library Injection |
ID | Name | Description |
---|---|---|
C0004 | CostaRicto |
During CostaRicto, threat actors used the 64-bit backdoor loader PS1.[1] |