CostaBricks is a loader that was used to deploy 32-bit backdoors in the CostaRicto campaign.[1]
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1140 | Deobfuscate/Decode Files or Information |
CostaBricks has the ability to use bytecode to decrypt embedded payloads.[1] |
|
| Enterprise | T1105 | Ingress Tool Transfer |
CostaBricks has been used to load SombRAT onto a compromised host.[1] |
|
| Enterprise | T1106 | Native API |
CostaBricks has used a number of API calls, including |
|
| Enterprise | T1027 | .001 | Obfuscated Files or Information: Binary Padding |
CostaBricks has added the entire unobfuscated code of the legitimate open source application Blink to its code.[1] |
| .002 | Obfuscated Files or Information: Software Packing |
CostaBricks can implement a custom-built virtual machine mechanism to obfuscate its code.[1] |
||
| Enterprise | T1055 | Process Injection |
CostaBricks can inject a payload into the memory of a compromised host.[1] |
|
| ID | Name | Description |
|---|---|---|
| C0004 | CostaRicto |
During CostaRicto, threat actors used a custom VM-based payload loader named CostaBricks.[1] |