CEELOADER
Description
(Mandiant) The threat actor used native Windows tools to perform initial reconnaissance, credential theft and deploy Cobalt Strike BEACON to devices via PowerShell. The actor then used this BEACON implant to persistently install CEELOADER as a Scheduled Task that ran on login as SYSTEM on specific systems. CEELOADER is [a] downloader that decrypts a shellcode payload to execute in memory on the victim device.
Names
Name |
---|
CEELOADER |
Category
Malware
Type
- Loader
Information
Malpedia
Other Information
Uuid
7faa4be1-750b-4e78-8c2e-ee6e23483813
Last Card Change
2023-06-22