PS1 is a loader that was used to deploy 64-bit backdoors in the CostaRicto campaign.[1]
Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1059 | .001 | Command and Scripting Interpreter: PowerShell | |
Enterprise | T1140 | Deobfuscate/Decode Files or Information |
PS1 can use an XOR key to decrypt a PowerShell loader and payload binary.[1] |
|
Enterprise | T1027 | Obfuscated Files or Information |
PS1 is distributed as a set of encrypted files and scripts.[1] |
|
Enterprise | T1055 | .001 | Process Injection: Dynamic-link Library Injection |
ID | Name | References |
---|---|---|
G0132 | CostaRicto |