Names | CEELOADER | |
Category | Malware | |
Type | Loader | |
Description | (Mandiant) The threat actor used native Windows tools to perform initial reconnaissance, credential theft and deploy Cobalt Strike BEACON to devices via PowerShell. The actor then used this BEACON implant to persistently install CEELOADER as a Scheduled Task that ran on login as SYSTEM on specific systems. CEELOADER is [a] downloader that decrypts a shellcode payload to execute in memory on the victim device. | |
Information | <https://www.mandiant.com/resources/russian-targeting-gov-business> | |
Malpedia | <https://malpedia.caad.fkie.fraunhofer.de/details/win.ceeloader> |
Last change to this tool card: 22 June 2023
Download this tool card in JSON format
Previous: CDorked
Next: CenterPOS
Changed | Name | Country | Observed | ||
APT groups | |||||
APT 29, Cozy Bear, The Dukes | 2008-Jun 2024 |
1 group listed (1 APT, 0 other, 0 unknown)
Digital Service Security Center Follow us on |
Report incidents |
|
+66 (0)2-123-1227 | ||
[email protected] |