Pisloader is a malware family that is notable due to its use of DNS as a C2 protocol as well as its use of anti-analysis tactics. It has been used by APT18 and is similar to another malware family, HTTPBrowser, that has been used by the group. [1]
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1547 | .001 | 启动或登录自动启动执行: Registry Run Keys / Startup Folder |
Pisloader establishes persistence via a Registry Run key.[1] |
| Enterprise | T1059 | .003 | 命令与脚本解释器: Windows Command Shell |
Pisloader uses cmd.exe to set the Registry Run key value. It also has a command to spawn a command shell.[1] |
| Enterprise | T1071 | .004 | 应用层协议: DNS | |
| Enterprise | T1132 | .001 | 数据编码: Standard Encoding |
Responses from the Pisloader C2 server are base32-encoded.[1] |
| Enterprise | T1083 | 文件和目录发现 |
Pisloader has commands to list drives on the victim machine and to list file information for a given directory.[1] |
|
| Enterprise | T1027 | 混淆文件或信息 |
Pisloader obfuscates files by splitting strings into smaller sub-strings and including "garbage" strings that are never used. The malware also uses return-oriented programming (ROP) technique and single-byte XOR to obfuscate data.[1] |
|
| Enterprise | T1082 | 系统信息发现 |
Pisloader has a command to collect victim system information, including the system name and OS version.[1] |
|
| Enterprise | T1016 | 系统网络配置发现 |
Pisloader has a command to collect the victim's IP address.[1] |
|
| Enterprise | T1105 | 输入工具传输 |
Pisloader has a command to upload a file to the victim machine.[1] |
|