S1109 PACEMAKER
PACEMAKER is a credential stealer that was used by APT5 as early as 2020 including activity against US Defense Industrial Base (DIB) companies.1
| Item | Value |
|---|---|
| ID | S1109 |
| Associated Names | |
| Type | MALWARE |
| Version | 1.1 |
| Created | 08 February 2024 |
| Last Modified | 15 April 2025 |
| Navigation Layer | View In ATT&CK® Navigator |
Techniques Used
| Domain | ID | Name | Use |
|---|---|---|---|
| enterprise | T1119 | Automated Collection | PACEMAKER can enter a loop to read /proc/ entries every 2 seconds in order to read a target application’s memory.1 |
| enterprise | T1059 | Command and Scripting Interpreter | - |
| enterprise | T1059.004 | Unix Shell | PACEMAKER can use a simple bash script for execution.1 |
| enterprise | T1074 | Data Staged | - |
| enterprise | T1074.001 | Local Data Staging | PACEMAKER has written extracted data to tmp/dsserver-check.statementcounters.1 |
| enterprise | T1083 | File and Directory Discovery | PACEMAKER can parse /proc/"process_name"/cmdline to look for the string dswsd within the command line.1 |
| enterprise | T1003 | OS Credential Dumping | - |
| enterprise | T1003.007 | Proc Filesystem | PACEMAKER has the ability to extract credentials from OS memory.1 |
| enterprise | T1055 | Process Injection | - |
| enterprise | T1055.008 | Ptrace System Calls | PACEMAKER can use PTRACE to attach to a targeted process to read process memory.1 |
Groups That Use This Software
| ID | Name | References |
|---|---|---|
| G1023 | APT5 | 1 |