Skip to content

S1109 PACEMAKER

PACEMAKER is a credential stealer that was used by APT5 as early as 2020 including activity against US Defense Industrial Base (DIB) companies.1

Item Value
ID S1109
Associated Names
Type MALWARE
Version 1.1
Created 08 February 2024
Last Modified 15 April 2025
Navigation Layer View In ATT&CK® Navigator

Techniques Used

Domain ID Name Use
enterprise T1119 Automated Collection PACEMAKER can enter a loop to read /proc/ entries every 2 seconds in order to read a target application’s memory.1
enterprise T1059 Command and Scripting Interpreter -
enterprise T1059.004 Unix Shell PACEMAKER can use a simple bash script for execution.1
enterprise T1074 Data Staged -
enterprise T1074.001 Local Data Staging PACEMAKER has written extracted data to tmp/dsserver-check.statementcounters.1
enterprise T1083 File and Directory Discovery PACEMAKER can parse /proc/"process_name"/cmdline to look for the string dswsd within the command line.1
enterprise T1003 OS Credential Dumping -
enterprise T1003.007 Proc Filesystem PACEMAKER has the ability to extract credentials from OS memory.1
enterprise T1055 Process Injection -
enterprise T1055.008 Ptrace System Calls PACEMAKER can use PTRACE to attach to a targeted process to read process memory.1

Groups That Use This Software

ID Name References
G1023 APT5 1

References