Skip to content

S0124 Pisloader

Pisloader is a malware family that is notable due to its use of DNS as a C2 protocol as well as its use of anti-analysis tactics. It has been used by APT18 and is similar to another malware family, HTTPBrowser, that has been used by the group. 1

Item Value
ID S0124
Associated Names
Type MALWARE
Version 1.1
Created 31 May 2017
Last Modified 30 March 2020
Navigation Layer View In ATT&CK® Navigator

Techniques Used

Domain ID Name Use
enterprise T1071 Application Layer Protocol -
enterprise T1071.004 DNS Pisloader uses DNS as its C2 protocol.1
enterprise T1547 Boot or Logon Autostart Execution -
enterprise T1547.001 Registry Run Keys / Startup Folder Pisloader establishes persistence via a Registry Run key.1
enterprise T1059 Command and Scripting Interpreter -
enterprise T1059.003 Windows Command Shell Pisloader uses cmd.exe to set the Registry Run key value. It also has a command to spawn a command shell.1
enterprise T1132 Data Encoding -
enterprise T1132.001 Standard Encoding Responses from the Pisloader C2 server are base32-encoded.1
enterprise T1083 File and Directory Discovery Pisloader has commands to list drives on the victim machine and to list file information for a given directory.1
enterprise T1105 Ingress Tool Transfer Pisloader has a command to upload a file to the victim machine.1
enterprise T1027 Obfuscated Files or Information Pisloader obfuscates files by splitting strings into smaller sub-strings and including “garbage” strings that are never used. The malware also uses return-oriented programming (ROP) technique and single-byte XOR to obfuscate data.1
enterprise T1082 System Information Discovery Pisloader has a command to collect victim system information, including the system name and OS version.1
enterprise T1016 System Network Configuration Discovery Pisloader has a command to collect the victim’s IP address.1

Groups That Use This Software

ID Name References
G0026 APT18 1

References