ETDA สำนักงานพัฒนาธุรกรรมทางอิเล็กทรอนิกส์
Electronic Transactions Development Agency
Report
Search
Home > List all groups > List all tools > List all groups using tool CEELOADER

Threat Group Cards: A Threat Actor Encyclopedia

Permanent link Tool: CEELOADER

NamesCEELOADER
CategoryMalware
TypeLoader
Description(Mandiant) The threat actor used native Windows tools to perform initial reconnaissance, credential theft and deploy Cobalt Strike BEACON to devices via PowerShell.
The actor then used this BEACON implant to persistently install CEELOADER as a Scheduled Task that ran on login as SYSTEM on specific systems. CEELOADER is [a] downloader that decrypts a shellcode payload to execute in memory on the victim device.
Information<https://www.mandiant.com/resources/russian-targeting-gov-business>
Malpedia<https://malpedia.caad.fkie.fraunhofer.de/details/win.ceeloader>

Last change to this tool card: 22 June 2023

Download this tool card in JSON format

All groups using tool CEELOADER

ChangedNameCountryObserved

APT groups

 APT 29, Cozy Bear, The DukesRussia2008-Jan 2024 HOTX

1 group listed (1 APT, 0 other, 0 unknown)

Digital Service Security Center
Electronic Transactions Development Agency

Follow us on

Facebook Twitter

Report incidents

Telephone +66 (0)2-123-1227
E-mail [email protected]