PingPull is a remote access Trojan (RAT) written in Visual C++ that has been used by GALLIUM since at least June 2022. PingPull has been used to target telecommunications companies, financial institutions, and government entities in Afghanistan, Australia, Belgium, Cambodia, Malaysia, Mozambique, the Philippines, Russia, and Vietnam.[1]
Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1071 | .001 | Application Layer Protocol: Web Protocols |
A PingPull variant can communicate with its C2 servers by using HTTPS.[1] |
Enterprise | T1059 | .003 | Command and Scripting Interpreter: Windows Command Shell |
PingPull can use |
Enterprise | T1543 | .003 | Create or Modify System Process: Windows Service | |
Enterprise | T1132 | .001 | Data Encoding: Standard Encoding |