PowerStallion is a lightweight PowerShell backdoor used by Turla, possibly as a recovery access tool to install other backdoors.[1]
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1059 | .001 | Command and Scripting Interpreter: PowerShell | PowerStallion uses PowerShell loops to iteratively check for available commands in its OneDrive C2 server.[1] | 
| Enterprise | T1070 | .006 | Indicator Removal: Timestomp | PowerStallion modifies the MAC times of its local log files to match that of the victim's desktop.ini file.[1] | 
| Enterprise | T1027 | Obfuscated Files or Information | PowerStallion uses a XOR cipher to encrypt command output written to its OneDrive C2 server.[1] | |
| Enterprise | T1057 | Process Discovery | PowerStallion has been used to monitor process lists.[1] | |
| Enterprise | T1102 | .002 | Web Service: Bidirectional Communication | PowerStallion uses Microsoft OneDrive as a C2 server via a network drive mapped with  |