TEXTMATE is a second-stage PowerShell backdoor that is memory-resident. It was observed being used along with POWERSOURCE in February 2017. [1]
| Name | Description | 
|---|---|
| DNSMessenger | 
                                                         Based on similar descriptions of functionality, it appears S0146, as named by FireEye, is the same as Stage 4 of a backdoor named DNSMessenger by Cisco's Talos Intelligence Group. However, FireEye appears to break DNSMessenger into two parts: S0145 and S0146. [2] [1]  | 
                                        
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1071 | .004 | Application Layer Protocol: DNS | |
| Enterprise | T1059 | .003 | Command and Scripting Interpreter: Windows Command Shell | 
                                         TEXTMATE executes cmd.exe to provide a reverse shell to adversaries.[1][2]  | 
                        
| ID | Name | References | 
|---|---|---|
| G0046 | FIN7 |