Pisloader

Pisloader is a malware family that is notable due to its use of DNS as a C2 protocol as well as its use of anti-analysis tactics. It has been used by APT18 and is similar to another malware family, HTTPBrowser, that has been used by the group. [1]

ID: S0124
Type: MALWARE
Platforms: Windows
Version: 1.1
Created: 31 May 2017
Last Modified: 30 March 2020

Techniques Used

Domain ID Name Use
Enterprise T1547 .001 启动或登录自动启动执行: Registry Run Keys / Startup Folder

Pisloader establishes persistence via a Registry Run key.[1]

Enterprise T1059 .003 命令与脚本解释器: Windows Command Shell

Pisloader uses cmd.exe to set the Registry Run key value. It also has a command to spawn a command shell.[1]

Enterprise T1071 .004 应用层协议: DNS

Pisloader uses DNS as its C2 protocol.[1]

Enterprise T1132 .001 数据编码: Standard Encoding

Responses from the Pisloader C2 server are base32-encoded.[1]

Enterprise T1083 文件和目录发现

Pisloader has commands to list drives on the victim machine and to list file information for a given directory.[1]

Enterprise T1027 混淆文件或信息

Pisloader obfuscates files by splitting strings into smaller sub-strings and including "garbage" strings that are never used. The malware also uses return-oriented programming (ROP) technique and single-byte XOR to obfuscate data.[1]

Enterprise T1082 系统信息发现

Pisloader has a command to collect victim system information, including the system name and OS version.[1]

Enterprise T1016 系统网络配置发现

Pisloader has a command to collect the victim's IP address.[1]

Enterprise T1105 输入工具传输

Pisloader has a command to upload a file to the victim machine.[1]

Groups That Use This Software

ID Name References
G0026 APT18

[1]

References