PowerShower

Malware updated a month ago (2024-11-29T13:30:45.695Z)
Download STIX
Preview STIX
PowerShower is a malware variant that emerged as a significant threat due to its ability to exploit and damage computer systems. It was first observed in attacks against European targets in October 2018, where it exploited the CVE-2017-11882 vulnerability. The malware, written in PowerShell, was downloaded through RTF templates and acted as an initial reconnaissance foothold. Its primary function was to download and execute a secondary payload with a more advanced set of features. Interestingly, PowerShower was named for its meticulous cleanup process after each operation, reducing traces of its activity. By December 2022, cybersecurity firms Check Point and Positive Technologies reported multi-stage attack sequences leading to the deployment of PowerShower. The malware was stored on disk using simple obfuscation techniques such as Base64-encoding and string concatenation. The versions of PowerShower observed during this period were less complex than earlier ones but maintained essential backdoor functions like HttpRequestG, HttpRequestP, and dec64. Notably, these functions could be tracked across different versions, indicating a consistent modus operandi. The PowerShower malware allowed attackers to communicate with a server they controlled, providing them with a powerful tool for cyber espionage or disruption. The malware first checked if Microsoft Word was running; if so, it would initiate a series of operations. The payload for the exploits was VBScript in an OLE package object, which decoded and executed PowerShower. Communication between the malware and the attacker's server was facilitated in XML format, further complicating detection efforts. In summary, PowerShower represented a sophisticated and evolving threat, demonstrating the persistent challenges in cybersecurity.
Description last updated: 2024-05-04T16:54:24.544Z
What's your take? (Question 1 of 2)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Aliases We are not currently tracking any aliases
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Backdoor
Malware
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Associated Vulnerabilities
To see the evidence that has resulted in these vulnerability associations, create a free account
Alias DescriptionAssociation TypeVotes
The CVE-2017-11882 Vulnerability is associated with PowerShower. CVE-2017-11882 is a significant software vulnerability, specifically a flaw in the design or implementation of Microsoft's Equation Editor. This vulnerability has been exploited by various threat actors to create malicious RTF files, most notably by Chinese state-sponsored groups using the "Royal RoUnspecified
2
Source Document References
Information about the PowerShower Malware was read from the documents corpus below. This display is limited to 20 results, create a free account to see more