POWRUNER

POWRUNER is a PowerShell script that sends and receives commands to and from the C2 server. [1]

ID: S0184
Type: MALWARE
Platforms: Windows
Version: 1.1
Created: 16 January 2018
Last Modified: 06 July 2020

Techniques Used

Domain ID Name Use
Enterprise T1047 Windows管理规范

POWRUNER may use WMI when collecting information about a victim.[1]

Enterprise T1059 .001 命令与脚本解释器: PowerShell

POWRUNER is written in PowerShell.[1]

.003 命令与脚本解释器: Windows Command Shell

POWRUNER can execute commands from its C2 server.[1]

Enterprise T1113 屏幕捕获

POWRUNER can capture a screenshot from a victim.[1]

Enterprise T1071 .001 应用层协议: Web Protocols

POWRUNER can use HTTP for C2 communications.[1][2]

.004 应用层协议: DNS

POWRUNER can use DNS for C2 communications.[1][2]

Enterprise T1132 .001 数据编码: Standard Encoding

POWRUNER can use base64 encoded C2 communications.[1]

Enterprise T1083 文件和目录发现

POWRUNER may enumerate user directories on a victim.[1]

Enterprise T1069 .001 权限组发现: Local Groups

POWRUNER may collect local group information by running net localgroup administrators or a series of other commands on a victim.[1]

.002 权限组发现: Domain Groups

POWRUNER may collect domain group information by running net group /domain or a series of other commands on a victim.[1]

Enterprise T1012 查询注册表

POWRUNER may query the Registry by running reg query on a victim.[1]

Enterprise T1082 系统信息发现

POWRUNER may collect information about the system by running hostname and systeminfo on a victim.[1]

Enterprise T1033 系统所有者/用户发现

POWRUNER may collect information about the currently logged in user by running whoami on a victim.[1]

Enterprise T1049 系统网络连接发现

POWRUNER may collect active network connections by running netstat -an on a victim.[1]

Enterprise T1016 系统网络配置发现

POWRUNER may collect network configuration data by running ipconfig /all on a victim.[1]

Enterprise T1087 .002 账号发现: Domain Account

POWRUNER may collect user account information by running net user /domain or a series of other commands on a victim.[1]

Enterprise T1518 .001 软件发现: Security Software Discovery

POWRUNER may collect information on the victim's anti-virus software.[1]

Enterprise T1105 输入工具传输

POWRUNER can download or upload files from its C2 server.[1]

Enterprise T1057 进程发现

POWRUNER may collect process information by running tasklist on a victim.[1]

Enterprise T1053 .005 预定任务/作业: Scheduled Task

POWRUNER persists through a scheduled task that executes it every minute.[1]

Groups That Use This Software

ID Name References
G0049 OilRig

[1]

References