PowGoop is a loader that consists of a DLL loader and a PowerShell-based downloader; it has been used by MuddyWater as their main loader.[1][2]
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1071 | .001 | Application Layer Protocol: Web Protocols | |
| Enterprise | T1059 | .001 | Command and Scripting Interpreter: PowerShell | 
                                         PowGoop has the ability to use PowerShell scripts to execute commands.[1]  | 
                        
| Enterprise | T1132 | .002 | Data Encoding: Non-Standard Encoding | 
                                         PowGoop can use a modified Base64 encoding mechanism to send data to and from the C2 server.[2]  | 
                        
| Enterprise | T1140 | Deobfuscate/Decode Files or Information | ||
| Enterprise | T1573 | Encrypted Channel | ||
| Enterprise | T1574 | .001 | Hijack Execution Flow: DLL | 
                                         PowGoop can side-load   | 
                        
| Enterprise | T1036 | Masquerading | 
                                 PowGoop has disguised a PowerShell script as a .dat file (goopdate.dat).[1]  | 
                |
| .005 | Match Legitimate Resource Name or Location | 
                                     PowGoop has used a DLL named Goopdate.dll to impersonate a legitimate Google update file.[1]  | 
                    ||
| ID | Name | References | 
|---|---|---|
| G0069 | MuddyWater |