Skip to content

S0147 Pteranodon

Pteranodon is a custom backdoor used by Gamaredon Group. 1

Item Value
ID S0147
Associated Names Pterodo
Type MALWARE
Version 2.1
Created 31 May 2017
Last Modified 23 August 2022
Navigation Layer View In ATT&CK® Navigator

Associated Software Descriptions

Name Description
Pterodo 32

Techniques Used

Domain ID Name Use
enterprise T1071 Application Layer Protocol -
enterprise T1071.001 Web Protocols Pteranodon can use HTTP for C2.1
enterprise T1547 Boot or Logon Autostart Execution -
enterprise T1547.001 Registry Run Keys / Startup Folder Pteranodon copies itself to the Startup folder to establish persistence.1
enterprise T1059 Command and Scripting Interpreter -
enterprise T1059.003 Windows Command Shell Pteranodon can use cmd.exe for execution on victim systems.13
enterprise T1059.005 Visual Basic Pteranodon can use a malicious VBS file for execution.3
enterprise T1074 Data Staged -
enterprise T1074.001 Local Data Staging Pteranodon creates various subdirectories under %Temp%\reports\% and copies files to those subdirectories. It also creates a folder at C:\Users\\AppData\Roaming\Microsoft\store to store screenshot JPEG files.1
enterprise T1140 Deobfuscate/Decode Files or Information Pteranodon can decrypt encrypted data strings prior to using them.4
enterprise T1041 Exfiltration Over C2 Channel Pteranodon exfiltrates screenshot files to its C2 server.1
enterprise T1083 File and Directory Discovery Pteranodon identifies files matching certain file extension and copies them to subdirectories it created.1
enterprise T1070 Indicator Removal -
enterprise T1070.004 File Deletion Pteranodon can delete files that may interfere with it executing. It also can delete temporary files and itself after the initial script executes.1
enterprise T1105 Ingress Tool Transfer Pteranodon can download and execute additional files.135
enterprise T1106 Native API Pteranodon has used various API calls.4
enterprise T1027 Obfuscated Files or Information -
enterprise T1027.007 Dynamic API Resolution Pteranodon can use a dynamic Windows hashing algorithm to map API components.4
enterprise T1053 Scheduled Task/Job -
enterprise T1053.005 Scheduled Task Pteranodon schedules tasks to invoke its components in order to establish persistence.13
enterprise T1113 Screen Capture Pteranodon can capture screenshots at a configurable interval.15
enterprise T1218 System Binary Proxy Execution -
enterprise T1218.005 Mshta Pteranodon can use mshta.exe to execute an HTA file hosted on a remote server.3
enterprise T1218.011 Rundll32 Pteranodon executes functions using rundll32.exe.1
enterprise T1497 Virtualization/Sandbox Evasion Pteranodon has the ability to use anti-detection functions to identify sandbox environments.5

Groups That Use This Software

ID Name References
G0047 Gamaredon Group 13452

References