Skip to content

S1046 PowGoop

PowGoop is a loader that consists of a DLL loader and a PowerShell-based downloader; it has been used by MuddyWater as their main loader.21

Item Value
ID S1046
Associated Names
Type MALWARE
Version 1.0
Created 29 September 2022
Last Modified 17 October 2022
Navigation Layer View In ATT&CK® Navigator

Techniques Used

Domain ID Name Use
enterprise T1071 Application Layer Protocol -
enterprise T1071.001 Web Protocols PowGoop can send HTTP GET requests to malicious servers.1
enterprise T1059 Command and Scripting Interpreter -
enterprise T1059.001 PowerShell PowGoop has the ability to use PowerShell scripts to execute commands.2
enterprise T1132 Data Encoding -
enterprise T1132.002 Non-Standard Encoding PowGoop can use a modified Base64 encoding mechanism to send data to and from the C2 server.1
enterprise T1140 Deobfuscate/Decode Files or Information PowGoop can decrypt PowerShell scripts for execution.21
enterprise T1573 Encrypted Channel PowGoop can receive encrypted commands from C2.2
enterprise T1574 Hijack Execution Flow -
enterprise T1574.002 DLL Side-Loading PowGoop can side-load Goopdate.dll into GoogleUpdate.exe.21
enterprise T1036 Masquerading PowGoop has disguised a PowerShell script as a .dat file (goopdate.dat).2
enterprise T1036.005 Match Legitimate Name or Location PowGoop has used a DLL named Goopdate.dll to impersonate a legitimate Google update file.2

Groups That Use This Software

ID Name References
G0069 MuddyWater 2

References