CreepySnail is a custom PowerShell implant that has been used by POLONIUM since at least 2022.[1]
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1071 | .001 | Application Layer Protocol: Web Protocols | CreepySnail can use HTTP for C2.[1] | 
| Enterprise | T1059 | .001 | Command and Scripting Interpreter: PowerShell | CreepySnail can use PowerShell for execution, including the cmdlets  | 
| Enterprise | T1132 | .001 | Data Encoding: Standard Encoding | CreepySnail can use Base64 to encode its C2 traffic.[1] | 
| Enterprise | T1041 | Exfiltration Over C2 Channel | CreepySnail can connect to C2 for data exfiltration.[1] | |
| Enterprise | T1016 | System Network Configuration Discovery | CreepySnail can use  | |
| Enterprise | T1033 | System Owner/User Discovery | CreepySnail can execute  | |
| Enterprise | T1078 | .002 | Valid Accounts: Domain Accounts | CreepySnail can use stolen credentials to authenticate on target networks.[1] |