CharmPower

MITRE
Malware Type:
Other
First seen:
Unknown
Last seen:
Unknown
Details:

[CharmPower](https://attack.mitre.org/software/S0674) is a PowerShell-based, modular backdoor that has been used by [Magic Hound](https://attack.mitre.org/groups/G0059) since at least 2022.(Citation: Check Point APT35 CharmPower January 2022)

Associated Techniques (24)
ID ATT&CK Tactics
T1005 Data from Local System -
T1008 Fallback Channels -
T1012 Query Registry -
T1016 System Network Configuration Discovery -
T1016.002 Wi-Fi Discovery -
T1041 Exfiltration Over C2 Channel -
T1047 Windows Management Instrumentation -
T1048.003 Exfiltration Over Unencrypted Non-C2 Protocol -
T1057 Process Discovery -
T1059.001 PowerShell -
T1059.003 Windows Command Shell -
T1070.004 File Deletion -
T1071.001 Web Protocols -
T1082 System Information Discovery -
T1083 File and Directory Discovery -
Used by Actors (1)
Metadata
ID: 349
Created: 13/01/2026 17:48
Updated: 06/03/2026 16:00