Movatterモバイル変換


[0]ホーム

URL:


  1. Home
  2. Software
  3. Pteranodon

Pteranodon

Pteranodon is a custom backdoor used byGamaredon Group.[1]

ID: S0147
Associated Software: Pterodo
Type: MALWARE
Platforms: Windows
Version: 2.1
Created: 31 May 2017
Last Modified: 16 April 2025

Associated Software Descriptions

NameDescription
Pterodo

[2][3]

Enterprise Layer
downloadview

Techniques Used

DomainIDNameUse
EnterpriseT1071.001Application Layer Protocol:Web Protocols

Pteranodon can use HTTP for C2.[1]

EnterpriseT1547.001Boot or Logon Autostart Execution:Registry Run Keys / Startup Folder

Pteranodon copies itself to the Startup folder to establish persistence.[1]

EnterpriseT1059.003Command and Scripting Interpreter:Windows Command Shell

Pteranodon can usecmd.exe for execution on victim systems.[1][2]

.005Command and Scripting Interpreter:Visual Basic

Pteranodon can use a malicious VBS file for execution.[2]

EnterpriseT1074.001Data Staged:Local Data Staging

Pteranodon creates various subdirectories under%Temp%\reports\% and copies files to those subdirectories. It also creates a folder atC:\Users\\AppData\Roaming\Microsoft\store to store screenshot JPEG files.[1]

EnterpriseT1140Deobfuscate/Decode Files or Information

Pteranodon can decrypt encrypted data strings prior to using them.[4]

EnterpriseT1041Exfiltration Over C2 Channel

Pteranodon exfiltrates screenshot files to its C2 server.[1]

EnterpriseT1083File and Directory Discovery

Pteranodon identifies files matching certain file extension and copies them to subdirectories it created.[1]

EnterpriseT1070.004Indicator Removal:File Deletion

Pteranodon can delete files that may interfere with it executing. It also can delete temporary files and itself after the initial script executes.[1]

EnterpriseT1105Ingress Tool Transfer

Pteranodon can download and execute additional files.[1][2][5]

EnterpriseT1106Native API

Pteranodon has used various API calls.[4]

EnterpriseT1027.007Obfuscated Files or Information:Dynamic API Resolution

Pteranodon can use a dynamic Windows hashing algorithm to map API components.[4]

EnterpriseT1053.005Scheduled Task/Job:Scheduled Task

Pteranodon schedules tasks to invoke its components in order to establish persistence.[1][2]

EnterpriseT1113Screen Capture

Pteranodon can capture screenshots at a configurable interval.[1][5]

EnterpriseT1218.005System Binary Proxy Execution:Mshta

Pteranodon can use mshta.exe to execute an HTA file hosted on a remote server.[2]

.011System Binary Proxy Execution:Rundll32

Pteranodon executes functions using rundll32.exe.[1]

EnterpriseT1497Virtualization/Sandbox Evasion

Pteranodon has the ability to use anti-detection functions to identify sandbox environments.[5]

Groups That Use This Software

References

×

[8]ページ先頭

©2009-2026 Movatter.jp