PS1 is a loader that was used to deploy 64-bit backdoors in the CostaRicto campaign.[1]
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1059 | .001 | Command and Scripting Interpreter: PowerShell | |
| Enterprise | T1140 | Deobfuscate/Decode Files or Information |
PS1 can use an XOR key to decrypt a PowerShell loader and payload binary.[1] |
|
| Enterprise | T1105 | Ingress Tool Transfer |
CostaBricks can download additional payloads onto a compromised host.[1] |
|
| Enterprise | T1027 | .013 | Obfuscated Files or Information: Encrypted/Encoded File |
PS1 is distributed as a set of encrypted files and scripts.[1] |
| Enterprise | T1055 | .001 | Process Injection: Dynamic-link Library Injection | |
| ID | Name | Description |
|---|---|---|
| C0004 | CostaRicto |
During CostaRicto, threat actors used the 64-bit backdoor loader PS1.[1] |