PowerStallion is a lightweight PowerShell backdoor used by Turla, possibly as a recovery access tool to install other backdoors.[1]
Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1059 | .001 | Command and Scripting Interpreter: PowerShell |
PowerStallion uses PowerShell loops to iteratively check for available commands in its OneDrive C2 server.[1] |
Enterprise | T1070 | .006 | Indicator Removal on Host: Timestomp |
PowerStallion modifies the MAC times of its local log files to match that of the victim's desktop.ini file.[1] |
Enterprise | T1027 | Obfuscated Files or Information |
PowerStallion uses a XOR cipher to encrypt command output written to its OneDrive C2 server.[1] |
|
Enterprise | T1057 | Process Discovery |
PowerStallion has been used to monitor process lists.[1] |
|
Enterprise | T1102 | .002 | Web Service: Bidirectional Communication |
PowerStallion uses Microsoft OneDrive as a C2 server via a network drive mapped with |
ID | Name | References |
---|---|---|
G0010 | Turla |