PowerStallion is a lightweight PowerShell backdoor used by Turla, possibly as a recovery access tool to install other backdoors.[1]
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1059 | .001 | 命令与脚本解释器: PowerShell |
PowerStallion uses PowerShell loops to iteratively check for available commands in its OneDrive C2 server.[1] |
| Enterprise | T1027 | 混淆文件或信息 |
PowerStallion uses a XOR cipher to encrypt command output written to its OneDrive C2 server.[1] |
|
| Enterprise | T1070 | .006 | 移除指标: Timestomp |
PowerStallion modifies the MAC times of its local log files to match that of the victim's desktop.ini file.[1] |
| Enterprise | T1102 | .002 | 网络服务: Bidirectional Communication |
PowerStallion uses Microsoft OneDrive as a C2 server via a network drive mapped with |
| Enterprise | T1057 | 进程发现 |
PowerStallion has been used to monitor process lists.[1] |
|