CostaBricks is a loader that was used to deploy 32-bit backdoors in the CostaRicto campaign.[1]
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1140 | Deobfuscate/Decode Files or Information | CostaBricks has the ability to use bytecode to decrypt embedded payloads.[1] | |
| Enterprise | T1105 | Ingress Tool Transfer | CostaBricks has been used to load SombRAT onto a compromised host.[1] | |
| Enterprise | T1106 | Native API | CostaBricks has used a number of API calls, including  | |
| Enterprise | T1027 | .001 | Obfuscated Files or Information: Binary Padding | CostaBricks has added the entire unobfuscated code of the legitimate open source application Blink to its code.[1] | 
| .002 | Obfuscated Files or Information: Software Packing | CostaBricks can implement a custom-built virtual machine mechanism to obfuscate its code.[1] | ||
| Enterprise | T1055 | Process Injection | CostaBricks can inject a payload into the memory of a compromised host.[1] | |
| ID | Name | Description | 
|---|---|---|
| C0004 | CostaRicto | During CostaRicto, threat actors used a custom VM-based payload loader named CostaBricks.[1] |