CharmPower is a PowerShell-based, modular backdoor that has been used by Magic Hound since at least 2022.[1]
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1047 | Windows管理规范 |
CharmPower can use |
|
| Enterprise | T1005 | 从本地系统获取数据 |
CharmPower can collect data and files from a compromised host.[1] |
|
| Enterprise | T1112 | 修改注册表 |
CharmPower can remove persistence-related artifacts from the Registry.[1] |
|
| Enterprise | T1573 | .001 | 加密通道: Symmetric Cryptography |
CharmPower can send additional modules over C2 encrypted with a simple substitution cipher.[1] |
| Enterprise | T1140 | 反混淆/解码文件或信息 |
CharmPower can decrypt downloaded modules prior to execution.[1] |
|
| Enterprise | T1059 | .001 | 命令与脚本解释器: PowerShell |
CharmPower can use PowerShell for payload execution and C2 communication.[1] |
| .003 | 命令与脚本解释器: Windows Command Shell |
The C# implementation of the CharmPower command execution module can use |
||
| Enterprise | T1008 | 回退信道 |
CharmPower can change its C2 channel once every 360 loops by retrieving a new domain from the actors’ S3 bucket.[1] |
|
| Enterprise | T1113 | 屏幕捕获 |
CharmPower has the ability to capture screenshots.[1] |
|
| Enterprise | T1071 | .001 | 应用层协议: Web Protocols |
CharmPower can use HTTP to communicate with C2.[1] |
| Enterprise | T1132 | .001 | 数据编码: Standard Encoding |
CharmPower can send additional modules over C2 encoded with base64.[1] |
| Enterprise | T1083 | 文件和目录发现 |
CharmPower can enumerate drives and list the contents of the C: drive on a victim's computer.[1] |
|
| Enterprise | T1048 | .003 | 替代协议渗出: Exfiltration Over Unencrypted Non-C2 Protocol |
CharmPower can send victim data via FTP with credentials hardcoded in the script.[1] |
| Enterprise | T1012 | 查询注册表 |
CharmPower has the ability to enumerate |
|
| Enterprise | T1070 | .004 | 移除指标: File Deletion |
CharmPower can delete created files from a compromised system.[1] |
| Enterprise | T1082 | 系统信息发现 |
CharmPower can enumerate the OS version and computer name on a targeted system.[1] |
|
| Enterprise | T1049 | 系统网络连接发现 |
CharmPower can use |
|
| Enterprise | T1016 | 系统网络配置发现 |
CharmPower has the ability to use |
|
| Enterprise | T1102 | 网络服务 |
CharmPower can download additional modules from actor-controlled Amazon S3 buckets.[1] |
|
| .001 | Dead Drop Resolver |
CharmPower can retrieve C2 domain information from actor-controlled S3 buckets.[1] |
||
| Enterprise | T1518 | 软件发现 |
CharmPower can list the installed applications on a compromised host.[1] |
|
| Enterprise | T1105 | 输入工具传输 |
CharmPower has the ability to download additional modules to a compromised host.[1] |
|
| Enterprise | T1057 | 进程发现 |
CharmPower has the ability to list running processes through the use of |
|
| Enterprise | T1041 | 通过C2信道渗出 |
CharmPower can exfiltrate gathered data to a hardcoded C2 URL via HTTP POST.[1] |
|
| ID | Name | References |
|---|---|---|
| G0059 | Magic Hound |