CostaBricks is a loader that was used to deploy 32-bit backdoors in the CostaRicto campaign.[1]
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1140 | 反混淆/解码文件或信息 |
CostaBricks has the ability to use bytecode to decrypt embedded payloads.[1] |
|
| Enterprise | T1106 | 本机API |
CostaBricks has used a number of API calls, including |
|
| Enterprise | T1027 | .001 | 混淆文件或信息: Binary Padding |
CostaBricks has added the entire unobfuscated code of the legitimate open source application Blink to its code.[1] |
| .002 | 混淆文件或信息: Software Packing |
CostaBricks can implement a custom-built virtual machine mechanism to obfuscate its code.[1] |
||
| Enterprise | T1105 | 输入工具传输 |
CostaBricks has been used to load SombRAT onto a compromised host.[1] |
|
| Enterprise | T1055 | 进程注入 |
CostaBricks can inject a payload into the memory of a compromised host.[1] |
|
| ID | Name | Description |
|---|---|---|
| C0004 | CostaRicto |
During CostaRicto, threat actors used a custom VM-based payload loader named CostaBricks.[1] |