PowGoop is a loader that consists of a DLL loader and a PowerShell-based downloader; it has been used by MuddyWater as their main loader.[1][2]
Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1071 | .001 | Application Layer Protocol: Web Protocols | |
Enterprise | T1059 | .001 | Command and Scripting Interpreter: PowerShell |
PowGoop has the ability to use PowerShell scripts to execute commands.[1] |
Enterprise | T1132 | .002 | Data Encoding: Non-Standard Encoding |
PowGoop can use a modified Base64 encoding mechanism to send data to and from the C2 server.[2] |
Enterprise | T1140 | Deobfuscate/Decode Files or Information | ||
Enterprise | T1573 | Encrypted Channel | ||
Enterprise | T1574 | .002 | Hijack Execution Flow: DLL Side-Loading |
PowGoop can side-load |
Enterprise | T1036 | Masquerading |
PowGoop has disguised a PowerShell script as a .dat file (goopdate.dat).[1] |
|
.005 | Match Legitimate Name or Location |
PowGoop has used a DLL named Goopdate.dll to impersonate a legitimate Google update file.[1] |
ID | Name | References |
---|---|---|
G0069 | MuddyWater |